, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x60000200, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x31080000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x24, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa4a3}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x48000) write(0xffffffffffffffff, &(0x7f0000000480), 0x0) [ 302.320041] ptrace attach of "/root/syz-executor0"[8724] was attempted by "/root/syz-executor0"[8725] [ 302.321288] IPVS: ftp: loaded support on port[0] = 21 21:01:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f0000000280)="df121e5e7398e5232a200c20e4e7fe1a9201f2e34d81acd7cae0be4af8e0cf5f79dea6f4e35cfb0241ad30b3ca891bc6fd45060a3b2328ea566f03d6bf28eff4fd5202a4689f20ad155b1cd28cbeb956ae6341fdd186556f75188ac09cc92bea6750a6180fe1174d54a71d20650c3f09ed35d3f26f18abdcdb16eba56f5dc723", 0x80, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x101000, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 21:01:59 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:01:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:01:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:01:59 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x60000200, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x31080000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x24, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa4a3}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x48000) write(0xffffffffffffffff, &(0x7f0000000480), 0x0) [ 303.378173] IPVS: ftp: loaded support on port[0] = 21 21:01:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:01:59 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:01:59 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) 21:01:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\v\x00\xff\xff\xff\xf9\x00\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0xffffff8c}], 0x1, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x10000}) 21:01:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:00 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141045, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x10507e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14, 0x0) sendfile(r1, r4, 0x0, 0x80003) 21:02:00 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:00 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\v\x00\xff\xff\xff\xf9\x00\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0xffffff8c}], 0x1, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x10000}) 21:02:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:00 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000500)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000200)=""/241, 0xf1}], 0x1}, 0x22) 21:02:02 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000200)='trusrn\xfcc,\a=\xf7\xa3\x914\xdb\xe1V\xb6\x0f\xf3!\x00', 0x0) pwrite64(r1, &(0x7f0000000000)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 21:02:02 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\v\x00\xff\xff\xff\xf9\x00\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0xffffff8c}], 0x1, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x10000}) 21:02:02 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:02 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) 21:02:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) 21:02:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:02 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:03 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:03 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:03 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0x2e2}}, 0x381, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x20, 0x84, 0x2}], 0x20}, 0x0) 21:02:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:03 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\v\x00\xff\xff\xff\xf9\x00\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0xffffff8c}], 0x1, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x10000}) 21:02:03 executing program 0: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x76}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:02:03 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) listen(0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}, {r1, 0x2}], 0x2, 0xbf3) close(0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) tkill(0x0, 0x6) ptrace(0x10, r0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) 21:02:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/128, 0xfffffffffffffead) 21:02:03 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:04 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:04 executing program 0: socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x1eed}, 0x28) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 21:02:04 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x201, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$P9_RREAD(r0, 0x0, 0x0) 21:02:04 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:02:04 executing program 2: r0 = add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f00000015c0)={'syz'}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001240)='keyring\x00', &(0x7f0000001280)={'syz'}, 0x0, 0x0, r1) 21:02:04 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) sendfile(r0, r2, 0x0, 0x1) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xfffffffffffffda1, 0x0, &(0x7f0000000100)=@abs, 0xa) [ 308.714726] xt_bpf: check failed: parse error 21:02:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:05 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='mem\x00\x01y.swaS.current\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0xfffffd1c}], 0x1, 0x20001000) io_setup(0x2, &(0x7f0000000240)) 21:02:05 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:05 executing program 2: mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 21:02:05 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:05 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:05 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0xa68) 21:02:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {0xffffffffffffffff, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:05 executing program 0: r0 = syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) setns(r0, 0x0) clone(0x70024000, &(0x7f0000000180), 0x0, 0x0, 0x0) 21:02:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0xa68) 21:02:05 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:05 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x42000, 0x0) geteuid() geteuid() sendmsg$nl_netfilter(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000c00)=ANY=[@ANYBLOB="4eb8fe74cc554a10c3771e59a40cc3b33c97af77af471d275f95a465db6ad5fdb128bf9495259b20ebcbb6bffd81ef92af26effbc0fcaa91bcdb6cba727479ab1f90ae96ea615e06b638e298b9efd0e297575c0b38e6e54d94520c242dde278c6f283d74bd142a714b560ad3e8bb6e5040fcbf183cfbf34d7469821a4f9ca3e8dcf38b7e92293293adaef0e6f65eee696d566f05b513cd0ada94acbdc9aa625a37894e6fb28616fda220da4805e9bc30032f9ed70b387b6b3f16b3d5e6f59ae32e0c003900656d312e5c3a0000"], 0xcd}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000240)={0xf8, 0x1439, 0x9, 0x636, 0x9, 0x2}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x9537, 0x0, 0xff, 0x4, 0x8, 0x80000000, 0x8daa, 0x3, 0x5, 0x2, 0x10000, 0x3, 0x2, 0x7fff, 0x3, 0x0, 0x100000001, 0xb7, 0xcd, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8, 0x9035, 0x8, 0xfff, 0x800, 0x9, 0x0, 0x3, 0x6, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffffffffef98}, 0x4000, 0x10000, 0x4, 0x1, 0x2, 0x531, 0x24000000000}, r3, 0x7, 0xffffffffffffffff, 0x0) io_setup(0xfffffffffffffffb, &(0x7f0000000080)) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x50, r0, 0x2) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) setgroups(0x2, &(0x7f0000000400)=[r4, r5]) shmctl$IPC_RMID(0x0, 0x0) 21:02:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0xa68) 21:02:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000001680)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYRESHEX]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009940)={{{@in, @in=@loopback}}, {{@in=@loopback}}}, &(0x7f0000009900)=0xaea1a78502d95c47) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002fc0)) getegid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() clone(0x2e828903, &(0x7f0000000080), 0x0, &(0x7f0000000140), &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(r0, &(0x7f0000000580), 0x0, &(0x7f0000000280)) 21:02:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000740)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:02:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, 0x0}, 0xa68) 21:02:06 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 310.165491] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 310.282602] kernel msg: ebtables bug: please report to author: Wrong len argument 21:02:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x80000000000201, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/55, 0xfffffcfc}], 0x1) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x400000000000, 0x0, 0x4, 0x6}) read(r2, &(0x7f0000000240)=""/19, 0x129) 21:02:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, 0x0}, 0xa68) 21:02:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) ioctl$SG_GET_NUM_WAITING(r0, 0x2286, &(0x7f0000000200)) [ 310.585312] print_req_error: 120 callbacks suppressed [ 310.585335] print_req_error: I/O error, dev loop5, sector 0 [ 310.596521] buffer_io_error: 120 callbacks suppressed [ 310.596542] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 310.609534] print_req_error: I/O error, dev loop5, sector 4 [ 310.615414] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 310.623210] print_req_error: I/O error, dev loop5, sector 8 [ 310.628979] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 310.636747] print_req_error: I/O error, dev loop5, sector 12 [ 310.642685] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 310.650442] print_req_error: I/O error, dev loop5, sector 16 [ 310.656357] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 310.664140] print_req_error: I/O error, dev loop5, sector 20 [ 310.669996] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 310.677853] print_req_error: I/O error, dev loop5, sector 24 21:02:06 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 310.683872] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 310.691578] print_req_error: I/O error, dev loop5, sector 28 [ 310.697529] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 310.705347] print_req_error: I/O error, dev loop5, sector 32 [ 310.711186] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 310.718994] print_req_error: I/O error, dev loop5, sector 36 [ 310.724897] Buffer I/O error on dev loop5, logical block 9, lost async page write [ 310.765155] kernel msg: ebtables bug: please report to author: Wrong len argument 21:02:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) tkill(0x0, 0x6) ptrace(0x10, r1) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/96, 0x60}], 0x1) 21:02:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, 0x0}, 0xa68) [ 311.183082] kernel msg: ebtables bug: please report to author: Wrong len argument 21:02:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0xa68) [ 311.529840] kernel msg: ebtables bug: please report to author: bad policy 21:02:07 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000740)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:02:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000080)={0x1}) close(r1) 21:02:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0xa68) 21:02:07 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:08 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") [ 311.959329] kernel msg: ebtables bug: please report to author: bad policy 21:02:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0xa68) 21:02:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000104000004040000f2000000b7050000230000006a0a00feca70a8d78500000036000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x7e, 0x0, &(0x7f0000000100)="10259d4423431e94d0b0561afa3ecebe84efcffb111ba8b19a0857feef4a9bb3aa0e289eb5d5ac221a001a0c4239351ffc8649c39be338a7f51c20d144ace7787843d23c56b4ee8a2039369a079a3b94ce4478635bf9313170b4d296e9dd86106dfdc5473f30fc4595813949eb95d660aa5f52b3cc4de33ffeb484a13826", 0x0, 0xc47}, 0x28) [ 312.321764] kernel msg: ebtables bug: please report to author: bad policy 21:02:08 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x87\xc6M\xbe\xa3z', 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000a00)="ed", 0x1}], 0x1, 0x0) 21:02:08 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:08 executing program 2: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 21:02:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 312.729636] kernel msg: ebtables bug: please report to author: bad policy 21:02:09 executing program 0: ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x94b, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 21:02:09 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) 21:02:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000002300)=""/4096, 0x1000) 21:02:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) [ 312.977757] kernel msg: ebtables bug: please report to author: bad policy 21:02:09 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:09 executing program 1: open(&(0x7f00000000c0)='./file1\x00', 0x40140, 0x81) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) execveat(r0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0) [ 313.024779] binder: 9112 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero. [ 313.024807] binder: 9112:9113 ioctl c018620c 20000000 returned -22 21:02:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 21:02:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 313.323208] kernel msg: ebtables bug: please report to author: bad policy 21:02:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) [ 313.500094] input: syz1 as /devices/virtual/input/input6 21:02:09 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) poll(0x0, 0x0, 0xbf3) close(r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:09 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) memfd_create(0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x400) [ 313.653552] kernel msg: ebtables bug: please report to author: bad policy 21:02:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="05010000000000000000010000000800040001000000d3a69d06f39e2dd054802897c5a3cf594b049d472622cd6e3e3676eda3d3c1ef07ae387b14e0b53daca04f28106e7bde01d2dc5026ca09646b49568014862e16d21d71b8915087bc7b1c75dcbf7ea46fc88a8ff635aa5038c5380a77496b10b02dabd3f8f75acc77a3e1646eb7de296eb8d8f8a68af82df41f6b0064f4378b96cbc1338ae0673e15746ec2b780c80681c1f954af5367b5f26083a5ed149bbb7fec65a9ef808e65654da16a423efce3"], 0x1}}, 0x0) 21:02:09 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$tun(r1, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x64) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) open$dir(0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmmsg(r2, &(0x7f0000005680)=[{{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000005400)=@un=@abs, 0x80, &(0x7f0000005580)=[{&(0x7f0000005480)=""/214, 0xd6}], 0x1, &(0x7f00000055c0)=""/185, 0xb9, 0x4}, 0x20}], 0x2, 0x0, 0x0) 21:02:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:10 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000240)={{0x1}}) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f6669acb7c20e24a311ab8e11a0126c65302000ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f0a57bf2239520ab81bf03c64305d05c845f0883b9a897736837d7fceaacb71ca63f8397d3408c641914278fb2f0800465b164defc36ea67d839fcca85f6077afc6f9f8024e8af1d583ab612e9777cab088294d0e1155075882ad600d511d76974639cf06def21435d8a830eda88fc9e1b6d37301a5"], 0xcb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)) [ 313.975066] kernel msg: ebtables bug: please report to author: bad policy 21:02:10 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7c, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x20) 21:02:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) [ 314.214406] kernel msg: ebtables bug: please report to author: bad policy 21:02:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0xfffffece) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00\x03aN\x06S\x1c\x13x\xe1\x83\x86\xcaG\xeb\x84!+\xbai\xffbbO5-\x0eF\xbd7\xdc\x1f\xe6\xf4$q \x96cKH`\xca\xf5\x14{dF\xcf\xc4\x8d{\xbft\xb6\x11(\x8b\v\xa0\xbc\x9ak\xbf\xad1\x9d\xc0\xd2\x11W\xf9G\b!\xd4\xcbq\x8d\x9d\xf5\xd3\x12\xe6\x82}U\x8a\t\xd8\xc0\x87s\x02q\xe4\xe07h\xca?\x1d\x00\xe9\xe4\xf3h\x96@i q&\x0e?\x1a>\x9a\xd3\xec\x84=:sK\xe2Qnj\xdc\xb5\x00\xd9\xd5\x9d\xd4\x8d\xd1O\xf68\xees\xd4;d\xa4\xfd\xea-\x8e\xa5\xb4O\xd4\xe9\xfd\xc0 ~\xd92k\xf6\x18\xab:c\xab\xe3\a\xf6\x04?\xc67\xcf\xda4\aN\xcd\r\a\bZ\xf35\x8b\x82\x92\xf7') close(r0) 21:02:10 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:10 executing program 1: clone(0x13102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7ffffe, 0x19}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:02:10 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0xbf3) close(r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x108) 21:02:10 executing program 1: socketpair(0xe, 0x5, 0x2, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/226, 0xe2}, {&(0x7f0000000180)=""/48, 0x30}, {&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000000580)=""/218, 0xda}, {&(0x7f0000000700)=""/72, 0x48}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x6, 0x0, 0x0, 0x100000000}, 0x12000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r5 = perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000a40)={&(0x7f0000000380)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000880)="1a320579bd30b2053000ded6ba3b5c8d17e265c726e537a189bb44ad11500768e0575568a7901e45b8cee8cd8fc887f6d4a2baf92fb980bb424287665ea5bb98ca00cac5eef94f5e91d43a89d8aa99221159551fc1c43eb495ba607813c8c51ea0eae3a558bb133a4cbc6ff90c49e430dc1c9ea30f", 0x75}], 0x1}, 0x1) r6 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0x4, &(0x7f0000002500), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x20) gettid() ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r7 = socket$kcm(0xa, 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) r9 = openat$cgroup(r4, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000009c0)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x11, 0x804, 0x5, &(0x7f0000000200)) r10 = gettid() ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) r11 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x3, 0x39, 0x961, 0x8, 0x0, 0x695d, 0x8, 0x0, 0x3, 0x3f, 0x7ff, 0x0, 0x35f, 0x2, 0x5c1, 0x9, 0x5, 0x800, 0x504, 0x100, 0x8, 0xffffffff, 0x80000001, 0x5, 0x8001, 0xb6, 0x800000000000, 0x8, 0x3b2e, 0x188, 0x98a, 0x1, 0x10001, 0xfffffffffffffffd, 0xffffffffffffff80, 0xffffffffffffffff, 0x0, 0x87b, 0x5, @perf_bp={&(0x7f0000000240), 0x2}, 0x20, 0x0, 0x832, 0x0, 0x8, 0x3, 0x1}, r10, 0x6, 0xffffffffffffff9c, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001d00)={&(0x7f0000000a00)='./file0\x00', r8}, 0x10) socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8936, &(0x7f0000000000)={r3}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r11, 0x2402, 0xcd7) recvmsg$kcm(r6, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a80)=""/57, 0x39}, {&(0x7f0000000ac0)=""/157, 0x9d}], 0x2, &(0x7f0000000bc0)=""/231, 0xe7, 0x6}, 0x10000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0xa, 0x2, 0x11) 21:02:10 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 314.747242] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 314.814645] device lo entered promiscuous mode 21:02:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00\x80\xf2]\xc1\xbc\xe5\x96\aU\xa9\xe5\xa05\x83.\xdd\xee\xab\xf3\xbe$\xdd\xd8\x16\xafs\x02\x80\x11<\x14dR\xd9\x98\xbb\x9c\x81\x98Kl\xc7s\x89$\xfd\x14[\x93\xe4z\xd4[\xf4\x86Y\xae\xdaB\xa6\xbcq\x00\xb2X\xad=\xce{\xaf\x02\xa9#\xc2-\xad\xf7\xa2q \b\x10\xb4Kn\xfc\xfe\a\xb9B\xd9>\x81r\x1c@-`\xe3\xe4O\x9b!') preadv(r1, &(0x7f0000001680)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0) 21:02:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0xfffffece) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00\x03aN\x06S\x1c\x13x\xe1\x83\x86\xcaG\xeb\x84!+\xbai\xffbbO5-\x0eF\xbd7\xdc\x1f\xe6\xf4$q \x96cKH`\xca\xf5\x14{dF\xcf\xc4\x8d{\xbft\xb6\x11(\x8b\v\xa0\xbc\x9ak\xbf\xad1\x9d\xc0\xd2\x11W\xf9G\b!\xd4\xcbq\x8d\x9d\xf5\xd3\x12\xe6\x82}U\x8a\t\xd8\xc0\x87s\x02q\xe4\xe07h\xca?\x1d\x00\xe9\xe4\xf3h\x96@i q&\x0e?\x1a>\x9a\xd3\xec\x84=:sK\xe2Qnj\xdc\xb5\x00\xd9\xd5\x9d\xd4\x8d\xd1O\xf68\xees\xd4;d\xa4\xfd\xea-\x8e\xa5\xb4O\xd4\xe9\xfd\xc0 ~\xd92k\xf6\x18\xab:c\xab\xe3\a\xf6\x04?\xc67\xcf\xda4\aN\xcd\r\a\bZ\xf35\x8b\x82\x92\xf7') close(r0) 21:02:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x108) 21:02:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x108) 21:02:11 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 314.967593] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 21:02:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:11 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:11 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f00000000c0)=[{r0}, {0xffffffffffffffff, 0x2}], 0x2, 0xbf3) close(r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:11 executing program 1: clone(0x2102001fbf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='smaps\x00') exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/189, 0xbd}], 0x1, 0x3) 21:02:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0xffffffff, @loopback, 0x10001}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x20000000000000ff}) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 21:02:11 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:02:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 21:02:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) dup3(r0, r2, 0x0) 21:02:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 21:02:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 21:02:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x0, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='/\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xaa\xd9U\xa3\xc9?\x9d$\x8bF\xa7\xc9\x9e\xb3[@k\xf9\x18\xff\x01s\x9eV\x18{-\xb8\xf1\aD$tRq\x06 B\xfb8\b\x18n\n\x83q2\xf9\x10\x8cX0s\xa4\xca\x94\xb3\xe4\xe5\x87\x17\xfe+e\x9f\xa3\x90<{s\xbdf\xb8?^\xcc\nsa%x\x96\x88?\x1bC\xffN\xc0\xa1\xe36\xb9/pTa\xaf\v`\x82Zx4\xff\xd0\xa73\x9d\x85\xc5\x1b\x8d\xb7\xb4\xc0\xe4\xf4\tS\xdd-\x9f!\x10\xf0L\x9f\xdf\x84\x89\xea\xa9\x96', 0xc3, 0x0) fremovexattr(0xffffffffffffffff, 0x0) 21:02:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:02:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x0, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:13 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) shutdown(r2, 0x0) accept(r1, 0x0, 0x0) 21:02:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 21:02:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 315.140496] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 317.430577] input: syz1 as /devices/virtual/input/input8 [ 317.490500] input: syz1 as /devices/virtual/input/input9 21:02:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x0, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:13 executing program 3: mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x2}], 0x1, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005240), 0x3a4, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write(0xffffffffffffffff, 0x0, 0x0) 21:02:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000080)='./control/file0\x00', 0x119) rmdir(&(0x7f0000000240)='./control\x00') 21:02:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = memfd_create(&(0x7f0000000700)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\x8c!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55\x00\x02\x00\x00\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811I\x98G\x87\"gz\x8c\r\xa3\xbf\x00\xf2G6\xe5\xe8\x88<\x06\x00\x00\x00\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)exp\x00\xe6\xa0Q=\xef\xbb$\xb6\xf2Y #\x93o\xac\xaeC\x00!\xa7\xecF\xb3H\xc7\x1c\xe9 \xf5\x10\x8b\xae\xc2\x1eR:\x17\xfe}\xe4\xb8Z\x13\xa4}2\xfa&\xcf(jh9\xd3\xdf\x91]\x06\xa0\xf0\xd7dtB\xe26\x95\xb5\xe7\x11/', 0x0) write$eventfd(r2, &(0x7f00000000c0)=0xa, 0x8) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d8, &(0x7f0000000040)) 21:02:14 executing program 3: mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'erspan0\x00', 0x43732e5398416f1a}) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9d) 21:02:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) rename(&(0x7f0000001480)='./bus\x00', &(0x7f00000014c0)='./file0\x00') 21:02:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:14 executing program 3: mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:15 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x80008) splice(r0, 0x0, r1, 0x0, 0x80004, 0x0) 21:02:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000080)='./control/file0\x00', 0x119) rmdir(&(0x7f0000000240)='./control\x00') 21:02:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000140)={'b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000100)=0x78) 21:02:15 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc8070831ff07714070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x40000000010, 0xffffffffffffffff, 0x4) clone(0x0, &(0x7f00000008c0), 0x0, &(0x7f0000000940), &(0x7f0000001a00)) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000280)=""/78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140), 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000d80)=ANY=[@ANYBLOB], 0x0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000100)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000140)=ANY=[]) bind$inet6(r2, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'bri\x00\x02\x00'}) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x200408d4, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)='\x00', 0x1, 0x3fffffa, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:02:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 21:02:15 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x0) 21:02:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0x0) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:16 executing program 2: unshare(0x200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='\x18vTh\xf7\xc3\x8d', 0x100000, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), 0x0, &(0x7f0000000040), &(0x7f0000000180)) mkdir(0x0, 0x0) 21:02:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000080)='./control/file0\x00', 0x119) rmdir(&(0x7f0000000240)='./control\x00') 21:02:16 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0x0) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:16 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, 0x0) 21:02:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'veti\xc4\xa2\x0e\x00\b\x00@\x00\xbd\xef\xff\t', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 21:02:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:16 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0x0) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000180)=0x3d, 0x4) sendto$inet6(r2, &(0x7f0000000280)="020300000700000000000000fff55b4202938207d9018080398d5b75000000007929301ee616d5c01843e065", 0x2c, 0x0, 0x0, 0x0) 21:02:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 21:02:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000080)='./control/file0\x00', 0x119) rmdir(&(0x7f0000000240)='./control\x00') 21:02:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:17 executing program 1: 21:02:17 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000740)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x2}, {0x1, 0x0, 0x1, 0xffffff7f7ffffffe}]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = socket$inet6(0xa, 0x0, 0x7) r4 = inotify_init() readahead(r2, 0x10002, 0x2) r5 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r5, 0x29, 0x46, &(0x7f00000000c0), 0x1) bind$inet6(r5, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffe7c) fsetxattr$security_smack_entry(r0, &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)=')\x00', 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r5, &(0x7f00007a8fff), 0x0, 0x20000000, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$input_event(r4, &(0x7f00000006c0)={{0x0, 0x7530}, 0x17, 0x3, 0xd5}, 0x18) r6 = getpid() connect(r3, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x8001}, 0x4, 0x3, 0x1, 0x2}}, 0x80) fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000480)={r9, 0x1, 0x6, @random="c3a252a0b72b"}, 0x10) setresuid(r7, r8, r10) sched_setscheduler(r6, 0x6, &(0x7f00000004c0)=0x3) sched_setscheduler(r6, 0x5, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000600)="261599b63376a142b2c17f06b6ad4366b37419c10d945e0c9ac1cacaa18237f096e2fe11ad5a686fb19a324245a4d0d7d845cff01504db3a9e6d524a05fdcda06e29c45b2585ba90a9bdaab29fc728a59121ba3ee9bb63e0505c4abc25863cc0fac9020504495eb5d7cc4317d56eafa516f285338bb91f4abf21adf7f971df703dc862e0d502fc496f48855bcbd27f9f5a40e02b947387d4d77a6e3322589d1f6c5f87b8d5a2273ccd3a9fe3aefb27969170f597b2b1cb", 0x0}, 0x18) setsockopt$inet6_buf(r3, 0x29, 0x107, &(0x7f00000004c0), 0xfffffffffffffe90) close(r0) 21:02:17 executing program 1: r0 = socket$inet6(0xa, 0x500000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00\x00\x02\x00', 0x10) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendto$inet6(r0, &(0x7f0000000140)='Y', 0x1, 0x41, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040), 0x8080400001) 21:02:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:17 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000740)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x2}, {0x1, 0x0, 0x1, 0xffffff7f7ffffffe}]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = socket$inet6(0xa, 0x0, 0x7) r4 = inotify_init() readahead(r2, 0x10002, 0x2) r5 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r5, 0x29, 0x46, &(0x7f00000000c0), 0x1) bind$inet6(r5, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffe7c) fsetxattr$security_smack_entry(r0, &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)=')\x00', 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r5, &(0x7f00007a8fff), 0x0, 0x20000000, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$input_event(r4, &(0x7f00000006c0)={{0x0, 0x7530}, 0x17, 0x3, 0xd5}, 0x18) r6 = getpid() connect(r3, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x8001}, 0x4, 0x3, 0x1, 0x2}}, 0x80) fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000480)={r9, 0x1, 0x6, @random="c3a252a0b72b"}, 0x10) setresuid(r7, r8, r10) sched_setscheduler(r6, 0x6, &(0x7f00000004c0)=0x3) sched_setscheduler(r6, 0x5, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000600)="261599b63376a142b2c17f06b6ad4366b37419c10d945e0c9ac1cacaa18237f096e2fe11ad5a686fb19a324245a4d0d7d845cff01504db3a9e6d524a05fdcda06e29c45b2585ba90a9bdaab29fc728a59121ba3ee9bb63e0505c4abc25863cc0fac9020504495eb5d7cc4317d56eafa516f285338bb91f4abf21adf7f971df703dc862e0d502fc496f48855bcbd27f9f5a40e02b947387d4d77a6e3322589d1f6c5f87b8d5a2273ccd3a9fe3aefb27969170f597b2b1cb", 0x0}, 0x18) setsockopt$inet6_buf(r3, 0x29, 0x107, &(0x7f00000004c0), 0xfffffffffffffe90) close(r0) 21:02:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000740)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x2}, {0x1, 0x0, 0x1, 0xffffff7f7ffffffe}]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = socket$inet6(0xa, 0x0, 0x7) r4 = inotify_init() readahead(r2, 0x10002, 0x2) r5 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r5, 0x29, 0x46, &(0x7f00000000c0), 0x1) bind$inet6(r5, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffe7c) fsetxattr$security_smack_entry(r0, &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)=')\x00', 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r5, &(0x7f00007a8fff), 0x0, 0x20000000, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$input_event(r4, &(0x7f00000006c0)={{0x0, 0x7530}, 0x17, 0x3, 0xd5}, 0x18) r6 = getpid() connect(r3, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x8001}, 0x4, 0x3, 0x1, 0x2}}, 0x80) fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000480)={r9, 0x1, 0x6, @random="c3a252a0b72b"}, 0x10) setresuid(r7, r8, r10) sched_setscheduler(r6, 0x6, &(0x7f00000004c0)=0x3) sched_setscheduler(r6, 0x5, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000600)="261599b63376a142b2c17f06b6ad4366b37419c10d945e0c9ac1cacaa18237f096e2fe11ad5a686fb19a324245a4d0d7d845cff01504db3a9e6d524a05fdcda06e29c45b2585ba90a9bdaab29fc728a59121ba3ee9bb63e0505c4abc25863cc0fac9020504495eb5d7cc4317d56eafa516f285338bb91f4abf21adf7f971df703dc862e0d502fc496f48855bcbd27f9f5a40e02b947387d4d77a6e3322589d1f6c5f87b8d5a2273ccd3a9fe3aefb27969170f597b2b1cb", 0x0}, 0x18) setsockopt$inet6_buf(r3, 0x29, 0x107, &(0x7f00000004c0), 0xfffffffffffffe90) close(r0) 21:02:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000740)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x2}, {0x1, 0x0, 0x1, 0xffffff7f7ffffffe}]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = socket$inet6(0xa, 0x0, 0x7) r4 = inotify_init() readahead(r2, 0x10002, 0x2) r5 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r5, 0x29, 0x46, &(0x7f00000000c0), 0x1) bind$inet6(r5, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffe7c) fsetxattr$security_smack_entry(r0, &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)=')\x00', 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r5, &(0x7f00007a8fff), 0x0, 0x20000000, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$input_event(r4, &(0x7f00000006c0)={{0x0, 0x7530}, 0x17, 0x3, 0xd5}, 0x18) r6 = getpid() connect(r3, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x8001}, 0x4, 0x3, 0x1, 0x2}}, 0x80) fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000480)={r9, 0x1, 0x6, @random="c3a252a0b72b"}, 0x10) setresuid(r7, r8, r10) sched_setscheduler(r6, 0x6, &(0x7f00000004c0)=0x3) sched_setscheduler(r6, 0x5, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000600)="261599b63376a142b2c17f06b6ad4366b37419c10d945e0c9ac1cacaa18237f096e2fe11ad5a686fb19a324245a4d0d7d845cff01504db3a9e6d524a05fdcda06e29c45b2585ba90a9bdaab29fc728a59121ba3ee9bb63e0505c4abc25863cc0fac9020504495eb5d7cc4317d56eafa516f285338bb91f4abf21adf7f971df703dc862e0d502fc496f48855bcbd27f9f5a40e02b947387d4d77a6e3322589d1f6c5f87b8d5a2273ccd3a9fe3aefb27969170f597b2b1cb", 0x0}, 0x18) setsockopt$inet6_buf(r3, 0x29, 0x107, &(0x7f00000004c0), 0xfffffffffffffe90) close(r0) 21:02:18 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:02:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) 21:02:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x1009}, 0x2b2) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 21:02:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:18 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:18 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000004000000000000008000000000000000000000000000000000000000040000000000000000000000"], 0x2c) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) getpgid(0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000006c0)) 21:02:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:18 executing program 1: 21:02:18 executing program 1: 21:02:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) r4 = socket(0xb, 0x3, 0x7) setsockopt$inet_mreqsrc(r4, 0x0, 0x2e, &(0x7f0000000040)={@remote, @remote, @broadcast}, 0xc) rmdir(&(0x7f0000000240)='./control\x00') 21:02:18 executing program 2: 21:02:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x2}], 0x2, 0xbf3) close(r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) 21:02:19 executing program 2: 21:02:19 executing program 1: 21:02:19 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:19 executing program 2: 21:02:19 executing program 1: 21:02:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:19 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:19 executing program 2: 21:02:19 executing program 1: 21:02:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) socket(0xb, 0x3, 0x7) rmdir(&(0x7f0000000240)='./control\x00') 21:02:19 executing program 4: 21:02:19 executing program 2: 21:02:19 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @loopback}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:20 executing program 4: 21:02:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x87}, {0x16}]}) 21:02:20 executing program 1: 21:02:20 executing program 4: 21:02:20 executing program 1: 21:02:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:20 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:20 executing program 4: 21:02:20 executing program 1: 21:02:20 executing program 2: 21:02:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0), 0x4) rmdir(&(0x7f0000000240)='./control\x00') 21:02:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @broadcast}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:20 executing program 4: 21:02:21 executing program 1: 21:02:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:21 executing program 2: 21:02:21 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:21 executing program 4: 21:02:21 executing program 1: 21:02:21 executing program 2: 21:02:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:21 executing program 4: 21:02:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r3 = openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './control', [{}, {0x20, 'ppp0vboxnet0-\xcdposix_acl_access'}, {0x20, './cgroup/syz0\x00'}], 0xa, "3e1ed89e2ba8775c8b12ed76d61cf28d5f0b1a8d63af6ef5acbb0949206a007bb873fe200089f1332f024cb5b7048a41e2880e1425240c60c1ff2b58bd2c195c504ef9f69cf67cfa5952da1ed675fb2b2c7d19526e1126b7c906a6f23ae0365c6f0922d256bef72159d837d770f922843fa90a43beeb362bbff464c517d31f70f40706190074bdd85195717fff"}, 0xc9) rmdir(&(0x7f0000000240)='./control\x00') 21:02:21 executing program 2: 21:02:21 executing program 1: 21:02:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @local}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:21 executing program 4: 21:02:21 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:21 executing program 2: 21:02:21 executing program 1: 21:02:21 executing program 4: 21:02:22 executing program 2: 21:02:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:22 executing program 1: 21:02:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) openat(r1, &(0x7f0000000180)='./control/file0/file0\x00', 0x101, 0x1) rmdir(&(0x7f0000000240)='./control\x00') 21:02:22 executing program 4: 21:02:22 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:22 executing program 2: 21:02:22 executing program 1: 21:02:22 executing program 2: 21:02:22 executing program 1: 21:02:22 executing program 4: 21:02:22 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x920, 0x920, 0x950, [@among={'among\x00', 0x888, {{0x200, 0x0, 0x0, {[], 0x9, [{[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9697]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa58) 21:02:22 executing program 1: 21:02:23 executing program 1: 21:02:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:23 executing program 2: 21:02:23 executing program 4: 21:02:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:23 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:23 executing program 2: 21:02:23 executing program 1: 21:02:23 executing program 4: 21:02:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:23 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:23 executing program 2: 21:02:23 executing program 1: 21:02:24 executing program 1: 21:02:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r2, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffff8, @remote, 0x4}, 0x1c) rmdir(&(0x7f0000000240)='./control\x00') 21:02:24 executing program 4: 21:02:24 executing program 2: 21:02:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x9f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'v73\'\x86\xee\xb1J\xbb\xf3\xb0\x02\x94X\x00', 'bridge_slave_1\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @empty, [], @empty, [], 0x930, 0x930, 0x960, [@among={'among\x00', 0x898, {{0x200, 0x0, 0x0, {[], 0xa, [{[], @local}, {[], @broadcast}, {[], @loopback}, {[], @multicast1}, {}, {[], @local}, {[], @loopback}, {[], @dev}, {[], @remote}, {[], @loopback}]}}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xa68) 21:02:24 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:24 executing program 4: 21:02:24 executing program 2: 21:02:24 executing program 5: 21:02:24 executing program 1: 21:02:24 executing program 4: 21:02:24 executing program 5: 21:02:24 executing program 2: 21:02:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r1 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r1, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000fc0)={'raw\x00', 0x2, [{}, {}]}, 0x48) rmdir(&(0x7f0000000240)='./control\x00') 21:02:25 executing program 1: 21:02:25 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:25 executing program 5: 21:02:25 executing program 4: 21:02:25 executing program 2: 21:02:25 executing program 2: 21:02:25 executing program 1: 21:02:25 executing program 4: 21:02:25 executing program 5: 21:02:25 executing program 1: 21:02:25 executing program 2: 21:02:26 executing program 4: 21:02:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r1 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r1, 0x0, 0x5, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:26 executing program 5: 21:02:26 executing program 2: 21:02:26 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:26 executing program 1: 21:02:26 executing program 2: 21:02:26 executing program 1: 21:02:26 executing program 4: 21:02:26 executing program 5: 21:02:26 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:26 executing program 1: 21:02:26 executing program 2: 21:02:27 executing program 1: 21:02:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r1 = socket(0x80000000000000a, 0x3, 0x2) fadvise64(r1, 0x0, 0x5, 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:27 executing program 2: 21:02:27 executing program 5: 21:02:27 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:27 executing program 4: 21:02:27 executing program 4: 21:02:27 executing program 5: 21:02:27 executing program 1: 21:02:27 executing program 2: 21:02:27 executing program 4: 21:02:27 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:27 executing program 1: 21:02:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) socket(0x80000000000000a, 0x3, 0x2) rmdir(&(0x7f0000000240)='./control\x00') 21:02:28 executing program 5: 21:02:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:02:28 executing program 4: r0 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x4) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000140)) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000090000003903000000000000060e000000000000010000000000000000000080000000000000000000000000000000000000000000000000000000000000000005000000ffffffffffffffff822d0000000000000002000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl(r1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c03577b32e5e4807994575940e4682b89ac2368e63a972d2", 0xe7, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) write$binfmt_misc(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="664231482c34a9eeba1fa005b0d22608f437cc8e1770b463e63572e0aa91f794c561368340359da7e2f7e6e1a2d4f6926c2f0838d96e528ba3e357abaec8856fa7e0c1c5f436"], 0x46) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TUNGETFILTER(r3, 0x800854db, &(0x7f00000003c0)=""/229) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x4e20, 0x0, 'none\x00', 0x20, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) sendfile(r1, r1, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:02:28 executing program 1: 21:02:28 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:28 executing program 1: 21:02:28 executing program 5: 21:02:28 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:28 executing program 5: 21:02:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xea\xff\x00@', &(0x7f0000000280)=@ethtool_ringparam={0x28}}) [ 332.415992] print_req_error: 366 callbacks suppressed [ 332.416017] print_req_error: I/O error, dev loop5, sector 0 [ 332.427235] buffer_io_error: 366 callbacks suppressed [ 332.427256] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 332.440288] print_req_error: I/O error, dev loop5, sector 4 [ 332.446127] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 332.453922] print_req_error: I/O error, dev loop5, sector 8 [ 332.459701] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 332.467521] print_req_error: I/O error, dev loop5, sector 12 [ 332.473430] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 332.481157] print_req_error: I/O error, dev loop5, sector 16 [ 332.487146] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 332.494939] print_req_error: I/O error, dev loop5, sector 20 [ 332.500801] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 332.508643] print_req_error: I/O error, dev loop5, sector 24 [ 332.514536] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 332.522398] print_req_error: I/O error, dev loop5, sector 28 [ 332.528261] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 332.536158] print_req_error: I/O error, dev loop5, sector 32 [ 332.542074] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 332.549802] print_req_error: I/O error, dev loop5, sector 36 [ 332.555828] Buffer I/O error on dev loop5, logical block 9, lost async page write 21:02:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x197) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0xd) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) close(0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x101, 0x105082) r3 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0x526987c9) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r2, r3, 0x0, 0x80003) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='ipddp0\x00', 0x4}) fcntl$getown(r4, 0x9) getpgid(0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) syz_open_procfs(r7, &(0x7f00000001c0)='limits\x00') 21:02:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:29 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:29 executing program 2: r0 = memfd_create(&(0x7f0000000340)='\f\xcd\x80\xbf\xcd\xbd\xfb\x8bwa\xc1WvU\xff\xc6\xb5%\xbd\n\x90\x9e\xa8\x94\xefC\x9f\xb1\xf4\x8arA\xa1\x88\xef\"/\xcd@\x19(\xb58\x88\xca\x8de*\xed\x89\x99\xa9*\xc3W&\xa4y]\xb5\x85P\xa7M\xf84\xcc\x91\xe7@\xdf\x8a\xc2*\x18\xd2:}\xae\xf6a\x02\x91\xf2\xc1\xc9\xcb\x90X0\xad\x02\xe9\x9b\xdd\x01\x8f\xfa\x9f\x16\x12pT1A\xcf.\x88\xf8b\x83e\x93K\x8ai\xb0|\xa6\xec\n\xf5\xe1|\xc6\x935\x92q\xaa\xfbv\x11\x02w/\xdb\xbe\xca\x94\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r0, &(0x7f00000000c0), 0xfffe) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000003, 0x11, r0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x444, &(0x7f0000000000)=[{}]}, 0x10) 21:02:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10001, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) r2 = gettid() sched_getaffinity(r2, 0x8, &(0x7f0000000000)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)=""/152) 21:02:29 executing program 4: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:29 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:29 executing program 1: r0 = memfd_create(0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB]) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) fstat(r4, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) geteuid() sendfile(r1, r1, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:02:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100), &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1000, &(0x7f00000002c0)='rootmode') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)='\x04[\x89\x8fs', 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) 21:02:29 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:29 executing program 5: r0 = socket$unix(0x1, 0x4000000002, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'ip6tnl0\x00\x00\x00\x00\x80\x00', @ifru_mtu}) 21:02:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu[cct.sta\x00\x00<2g\xf6/\x87\x9f\xba\xea?*\x81^\xda7\xb4P\xad\xfc;j\xbe;\xdd\xcf\xf2\x7fK\xda\xc2\xe8F+=\xce9\xf0&H\x7f\xdaP?\xbb\xa1\xb6\x18_\xd0_\x9bg\xf0\xc9\xab\xba3\xde\xcc\x97K\xca\xffY\xf2\xaa\x1e\x8ec\xea\xfa\xef.V2T\x1a\x10\x80\xdc\xcd|g\x16A\x97\xd5DL\x04\xdd\x7f\xcd\x16JC\xa8\xc2B\xb1u[\x066x\x9d\xa0\x13X5\xbf\"F\x98\xff\x02\xc4\xdd\xcf\xed@1\xb0\x17\x89\x12\xa3tF\xdc,n\xdd\x86\xae\xe8\'B\x8fX\xe1\x13lB\x98~\xeb\xb0\xef\xc6\xd2W\xf0\xa9x\xe2\x8dXx\xa9\xf7MmR\xa6\x9f\x98bQ\xba\xf0\xc4\xb4e#P\xb0', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f"], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x5460, &(0x7f0000000240)) 21:02:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) exit(0xbda) rmdir(&(0x7f0000000240)='./control\x00') 21:02:30 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:30 executing program 5: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, &(0x7f00000001c0)='\xe5\xf8WN\a\xb9:A?\xf3\xf8\xc3\x0e\xb7\xa3\xee\xe3\xdb\x9d\t:\x7f\f\x8cy\x1e(\xd2\x81~~\xa0\x87\\>\x8f\x92\xebw\x1d\x99\xca\xde\xcfNN\xec\xc28\xb2\ri[t\xe5\xbe\xa9\x19\xd4=\x99\b\xfdk~\xff .\xb0\xf54\xb9)\x11\x93\xfe’ëw™ÊÞÏNNìÂ8² i[t復Ô 21:02:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100), &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1000, &(0x7f00000002c0)='rootmode') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)='\x04[\x89\x8fs', 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) 21:02:30 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00\xecF\xd9\xf72\x19]\x8dGb\xc6\xcbI>\x8e\x98$\a\x19\xb91\x86\xe4\xa8\xbd\xbe\x12\xa7\xaf\x00\xff\xfd\xca\xc51\x011\xf9\xe0\x90@H0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r3, &(0x7f0000000440)) fstat(r0, &(0x7f00000006c0)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000380)=0xfffffffffffffcd6) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:02:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x99\x00', 0x4000000000000003) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr(r2, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='\x02\x00\x00\x00 \x00\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x4, 0x0) dup3(r1, r2, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x1) 21:02:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:31 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:31 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:31 executing program 5: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0xb02) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x80000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) unshare(0x40000) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000002000)) 21:02:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r3, &(0x7f0000000440)) fstat(r0, &(0x7f00000006c0)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000380)=0xfffffffffffffcd6) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:02:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'gretap0\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000240)={'v\x88t\x05\x00\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x4b732e5398416f17}) poll(&(0x7f0000000040)=[{r1}, {r3}], 0x2, 0x9d) dup2(r2, r3) dup3(r3, r1, 0x0) 21:02:32 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:32 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1, 0x0) readv(r0, &(0x7f00000001c0), 0xbf) 21:02:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:32 executing program 0: fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = memfd_create(&(0x7f0000000700)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\x8c!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55\x00\x02\x00\x00\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811I\x98G\x87\"gz\x8c\r\xa3\xbf\x00\xf2G6\xe5\xe8\x88<\x06\x00\x00\x00\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)exp\x00\xe6\xa0Q=\xef\xbb$\xb6\xf2Y #\x93o\xac\xaeC\x00!\xa7\xecF\xb3H\xc7\x1c\xe9 \xf5\x10\x8b\xae\xc2\x1eR:\x17\xfe}\xe4\xb8Z\x13\xa4}2\xfa&\xcf(jh9\xd3\xdf\x91]\x06\xa0\xf0\xd7dtB\xe26\x95\xb5\xe7\x11/', 0x0) write$eventfd(r2, &(0x7f00000000c0)=0xa, 0x8) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d8, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000100)) 21:02:32 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000140)='net/f\xdbb\x7ftrie\x00') 21:02:32 executing program 0: fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:33 executing program 0: fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:33 executing program 5: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) tkill(r0, 0x6) ptrace(0x10, r0) 21:02:33 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 21:02:33 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:33 executing program 5: r0 = memfd_create(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x60c, 0x3e}) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r4, &(0x7f0000000440)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) geteuid() sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:02:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:33 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$inet(0x2, 0x2, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) bind(r0, &(0x7f00000001c0)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80) 21:02:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002"], 0x2d) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigsuspend(&(0x7f0000000040), 0x8) [ 337.775891] print_req_error: 693 callbacks suppressed [ 337.775916] print_req_error: I/O error, dev loop5, sector 0 [ 337.787158] buffer_io_error: 693 callbacks suppressed [ 337.787201] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 337.800276] print_req_error: I/O error, dev loop5, sector 4 [ 337.806140] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 337.813945] print_req_error: I/O error, dev loop5, sector 8 21:02:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000240)='./control\x00') [ 337.819728] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 337.827516] print_req_error: I/O error, dev loop5, sector 12 [ 337.833435] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 337.841170] print_req_error: I/O error, dev loop5, sector 16 [ 337.847115] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 337.854903] print_req_error: I/O error, dev loop5, sector 20 [ 337.860784] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 337.868577] print_req_error: I/O error, dev loop5, sector 24 21:02:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) [ 337.874482] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 337.882310] print_req_error: I/O error, dev loop5, sector 28 [ 337.888167] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 337.896148] print_req_error: I/O error, dev loop5, sector 32 [ 337.902085] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 337.909805] print_req_error: I/O error, dev loop5, sector 36 [ 337.915750] Buffer I/O error on dev loop5, logical block 9, lost async page write 21:02:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r0, &(0x7f0000000140), 0x800000000000800) 21:02:34 executing program 4: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x1c7) ftruncate(r3, 0x2007fff) getsockopt$sock_int(r5, 0x1, 0x1d, &(0x7f00000001c0), &(0x7f0000000300)=0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r8, r9+10000000}, 0x0) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 21:02:34 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000240)='./control\x00') 21:02:34 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1f) 21:02:34 executing program 5: r0 = memfd_create(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r4, &(0x7f0000000440)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) geteuid() sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:02:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='ns\x00f\x82}r2\xf2\xf0|<\x14\x85H\x1c\xba\xb6\x06A\x92\xf9\xcc\x84\x8f\xd2~\x8c\x84r\xed\xca\xea\x159\xf0{\xa9\xc65\xd0\xad\xad\x18\x84\xed\"\f\xe5\x02k\xcdk\x1fNcr\x8d\xfd\x1bi\xb6\xaf*L\x9a_w\"\x8d?D\x8f[0\xd9\xb8\xbe^\x89\x9f\xf8\xed\xa1\xe7\xe1\x94J\xfd-\x84\x85\xd9\xa4\x15\xcf\xadP~N\xb3\x91\x8f:\x91\xe5\xbb\x8d\x142\x94}e\x98*H/BC\xdd,lm\xbd\x88\xf5\x85u\xc7C#&t\t\xa9(X:6\x95\xf4\xcd\x8fwX\x8f\xd3\xdeU\xfd\x9aJ,\xdb\x15\xaad\xb3LR\x8aXn\x13U\x93B\xd88\xd5\xf0\xc0$o\xec\x9az\x84\xa13\xe1\xabs\xe5\x9b\x17\xfaJ\x00\xacc\xae7@\xe1\x02\x85h\xab\xa3\x00\r\xce\xf4I]\xc6\xa4\xa9\xdd\xe91v\xc5\xdc:L[\xc8\xe4\xeb\xe1`\xfal\x8e') exit(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000080)=""/107, 0x6b) 21:02:34 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1f) 21:02:34 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(0x0, &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:34 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rmdir(&(0x7f0000000240)='./control\x00') 21:02:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) readv(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1f) 21:02:35 executing program 4: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x1c7) ftruncate(r3, 0x2007fff) getsockopt$sock_int(r5, 0x1, 0x1d, &(0x7f00000001c0), &(0x7f0000000300)=0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r8, r9+10000000}, 0x0) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 21:02:35 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(0x0) 21:02:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:35 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(0x0) 21:02:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 21:02:35 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(0x0, &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000001780)) 21:02:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:35 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(0x0) 21:02:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) renameat2(r1, &(0x7f00000000c0)='./bus\x00', r2, &(0x7f0000000140)='./bus\x00', 0x5) fcntl$setstatus(r2, 0x4, 0x6100) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000000)={0x57, 0x1}) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 21:02:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x0, &(0x7f0000b18000/0xe000)=nil) 21:02:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') 21:02:36 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(0x0, &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:36 executing program 5: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) stat(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1) 21:02:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'v\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x13) [ 340.510302] device lo entered promiscuous mode 21:02:36 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0xfc1) sendfile(r0, r0, &(0x7f0000000040), 0xff8) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='./file0\x00') 21:02:36 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), 0x0, &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:36 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r0, 0x0, 0x1f) 21:02:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_misc(r0, 0x0, 0x0) write$P9_RSTATu(r1, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32]], 0x4451417f) fchmod(r1, 0x10) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)) 21:02:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f00000000c0)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9q\xed\x80\xfahC\xd3\xbe\xe8\x8b\xb3\x81\xf3L\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 21:02:36 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r0, 0x0, 0x1f) [ 340.905516] input: syz1 as /devices/virtual/input/input10 [ 340.966371] input: syz1 as /devices/virtual/input/input11 21:02:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\xdf\x00\x00') fstat(r0, &(0x7f00000000c0)) 21:02:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001a80)='./cgroup\x00\x00\x00\x00\x00\xdb\x88yt\xa9\xd4\xb8\x04\x9e f\x06\xa8\b\xfc\xfe=\xd3\x12\x91\xf7\x86\xce\xe9*.\xd9\xcc\x0e\xeb\x0fn\x1b!p\x05W\xd7\xd3!\xc6\x16\xf2\xa6\x9f\x97^]X\ah1\x03\xcfHQo\xd9`c`1\x93\xe1\xcc1\t\xac\x8e\xeb4\x89\xd6\xa5\xd8n\xeao\xc6j\xdcl\x927\x8dI', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x410802, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) close(r1) 21:02:37 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\xef\xa8\xc1\xc5\xb8\xfe\xcc?Hl3\x06\xda&\x06\x00\x00\x00\x8f)Z\xc8\xbcp\a\x00\x00$\\\x06eZ3&\x1aq2G\x85\x1d\xc0\xd9\xc5\xe6\xe8\xb6z\xea7\xaaf\xc0\x0e\x82\x03F\xca\xa3\xb7\xc2\xf8\xb6\xa4') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 21:02:37 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), 0x0, &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) lgetxattr(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000180)=""/87, 0x57) 21:02:37 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r0, 0x0, 0x1f) 21:02:37 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x0, 0xa4, 0x9, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x9, 0xfffffffffffffffc, 0x7, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x8d3, 0x0, 0x0, 0x0, 0x1db, 0x6, 0x5, 0x8001, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x801, 0x0, 0x1, 0x0, 0x1, 0x3, 0x7fff}, 0x0, 0xe, 0xffffffffffffff9c, 0x2) r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), &(0x7f0000000300)=0x4) pipe(0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) nanosleep(0x0, 0x0) tkill(r0, 0x15) removexattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)=@known='system.advise\x00') setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x20008011, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:02:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x06_ttam\x00', 0x1}, 0xfffffffffffffdc4) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) 21:02:37 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), 0x0, &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYRESDEC=r1], 0x14}}, 0x3ffff) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="000000000800120000ffff1500000000000000fd3900004d4d0c181169dadc324585b7000000001e89bc0dd010916400e0000001000000001000000000003500000000000476019821aca5e09e35a873acd42d23cecfd058057ffea9db635046a7a4a01ca909e6e395895d46df165c8760dee2d24e95a4d4d3ff0700000000000016dbe198ce16a41d30c88fb0d51225ead183b14a94adc48a9c7dc3893da0d4790c9025d7761164ce5c1ea8627fda8039e63307620c96d12d2cb1663b30770bc2aec75ddfcb40603b8ed13d121960beb5447800000000000000000000000000000000"], 0xe3}}, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @remote}, &(0x7f0000000080)=0xc) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) write$FUSE_IOCTL(r6, &(0x7f0000000500)={0x20, 0xffffffffffffffff, 0x0, {0x0, 0x0, 0x8, 0x7fffffff}}, 0x20) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x40000) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000001280)='ip6gretap0\x00', 0x10) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_ifreq(r3, 0x8971, &(0x7f0000000340)={'vet\x10B\xf2*CF\xc8\x9fnd\x00', @ifru_addrs=@ax25={0x3, {"ee75b8edf7dee0"}, 0x40}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000140)=0x1e) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @empty}}, 0xfffffffffffffcc0) sync_file_range(0xffffffffffffffff, 0x0, 0x1, 0x9) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) r7 = request_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='ip6gretap0\x00', 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x0, r7) r8 = socket$inet6_udp(0xa, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000480)) 21:02:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x06_ttam\x00', 0x1}, 0xfffffffffffffdc4) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) 21:02:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={'lo:\x93\xf2\x90\xe43\x96\x96\x0e\x00\x10\x00'}) 21:02:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:39 executing program 5: clock_adjtime(0xffffffffffffffff, 0x0) 21:02:39 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', 0x0, 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:39 executing program 1: socketpair$unix(0x1, 0x800000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x200031, 0xffffffffffffffff, 0x0) fstatfs(r1, &(0x7f00000000c0)=""/114) 21:02:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x06_ttam\x00', 0x1}, 0xfffffffffffffdc4) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) 21:02:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:39 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x2) fcntl$getown(r0, 0x9) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x800000000353) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0xfffffffffffffffe, 0x4) fadvise64(0xffffffffffffffff, 0x0, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000480)={'erspan0\x00', r4}) r5 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x110007e) r6 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000003c0)={0x0, r6, 0xffffffff, 0x8, 0xfffffffffffffe00, 0xffffffffffff2502}) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$cgroup_subtree(r6, &(0x7f0000000780)=ANY=[@ANYBLOB="2d696f202f72646d61202b70696473202b72646d61202d696f202b6d656d6f7279202f6d656d6f727920d935f61bf9e5d248a6da9c3d98feea75f992314ea9ea41a225ef0aa09a174cdaed3f84f4cdd4c004dc9785a725c86c672c9926ebc84e0d69e3c8f934c93269ef4a141a429051ae71b9e1478e73d618be66e3f2776474c59dab4134fbed154a67c7528c765df65118d1ab43a82bfea5e8aa8cb88b331dac36fd5b4dea82f35352d8aa91f85563a53046f2e6689bbf78f9f31c7c4b7c667d16333fea9d7e518327ded68a3d70c389a4bca047af39e88db97c6ab587658b7ac815490b980413669650b1824243295e74a39d3c1bc116e3f43a3a6931318eaa795044b5873410e77e4cb5c2dcbbc6a5dc15b5427a43830a380ba535b14490153cd79d441d50e9f17e5db096ef514065e6d864fc25ee0c80fd025c70fd5ecd1631e9db5677df7b380e3f1fe4b05ff9af579134ee9b4e0e48cd6d0ddb37dbf4543710364d"], 0x165) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000c80)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) pipe(&(0x7f0000000140)) gettid() 21:02:39 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000001440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 21:02:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:39 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', 0x0, 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000ac0)=0xcea) 21:02:39 executing program 5: r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x794d9d7e) fcntl$addseals(r0, 0x409, 0x0) 21:02:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vet\x89:\xa6\xcbDV\xc9?\x00\xbdh\x00', 0x43732e5398416f1a}) 21:02:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000440)='\x00\xac=\x9dJ\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0fG\xb2K\xce49\x9e\xb0\xb1\x1a\x18\xbd\x8b~\xc23\xe9\x01_\xba\xb5Q\x8f\x18\xc2\x96', 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@remote, @empty, @multicast2}, &(0x7f00000000c0)=0xc) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)=0x4000) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd) 21:02:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:40 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', 0x0, 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0x8, 0x2, 0x0, 0x1, [{}]}) 21:02:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:40 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffc, 0x0) 21:02:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:41 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x0, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 21:02:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) [ 345.077081] mmap: syz-executor5 (10519) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:02:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) [ 345.163112] device lo left promiscuous mode [ 345.176173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:02:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000380)='cwd/.\x00\x00\x00\xd8s\x11Z\xb9\x8f\'PO\xf8\x8bZY\x86W\xb63K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RK\x87G\xda\xf1\xdf\xf5\x19j\x13~9\x8bF\t\f0\xd0R\xea\x98\xb8\b$\xdf\xf5\xd6j!.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\x11\x0e\xa3\xddNg\xac*SV\x1c\xc2AJ\x9d\xdb1\b\xae') 21:02:41 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 21:02:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000017c0)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140), 0xc) getsockname(0xffffffffffffff9c, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000680)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000006c0)={@dev={0xfe, 0x80, [], 0xb}, 0x20, 0xfffffffffffffffd, 0x3, 0x3, 0x1, 0xf47, 0x5}, 0x20) fchdir(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000500)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f0000000540)='./bus\x00', 0xc000, 0x0) lseek(r3, 0x0, 0x2) r5 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) write$P9_RREADLINK(r5, &(0x7f00000000c0)=ANY=[@ANYRES32=r5, @ANYRES64=r1, @ANYRESHEX, @ANYRES32=r4, @ANYRESDEC=0x0], 0x36) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'.yz'}, &(0x7f0000000100)="ae", 0x1, 0xfffffffffffffffc) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000300)='./file2\x00') ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r7 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000003c0)="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") mkdirat(r5, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) renameat2(r7, &(0x7f0000000080)='./file0\x00', r7, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) write$P9_RLINK(r5, &(0x7f0000001740)={0xfe5b, 0x47, 0x1}, 0x7) renameat(r5, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000000)='./file0\x00') readlinkat(r7, &(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740)=""/4096, 0xfffffffffffffdb1) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f0000000180)='./bus\x00', 0x40) setsockopt$inet_tcp_int(r4, 0x6, 0x1f, &(0x7f00000004c0)=0xff, 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 345.567958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 21:02:41 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) [ 345.629920] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:02:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 21:02:41 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x0, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 346.232312] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 21:02:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='projid_map\x00\xaa\xe7\x9d\xaa\x90\x1d\xfd*J\xcbAYd\x92\b4T\x83\xc0\xf9u\xc0\x9c?\xe8*\x95\xc5\xbc|@\xac\x0e\x92\x8a\xd4\xe7E:\a\x9e\f=\xed\xae+\xc2\xf1-\xdeR\x06\x00\x06\x00k\fX\xfa+\xe6\xad\xa5X-\n') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x32, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) 21:02:42 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x1f) 21:02:42 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x0, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'\x00\x00\x00aZm\xc8\x00', 0x400}) close(r1) 21:02:42 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:42 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000340)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) write(r0, &(0x7f0000000180)="3fd074d8084c46562a03725e57a3741773ee6924097e", 0x16) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x526987c9) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x80003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) 21:02:42 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:42 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x20) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x40, 0x9, 0x4}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000005c0)) getresgid(0x0, &(0x7f00000004c0), &(0x7f0000000440)) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x800) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 21:02:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:43 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:43 executing program 5: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00/\x00\x00c\x89\x15\xe0\xdfV\xacY\x1a)\x85iPlI\x00\x00') getdents(r0, &(0x7f00000000c0)=""/147, 0x93) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 21:02:43 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:43 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 21:02:43 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000300)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x34f}}, 0x0) close(r1) 21:02:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:44 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) [ 347.902923] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:02:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1f) 21:02:44 executing program 5: r0 = memfd_create(&(0x7f0000000080)='system_u:object_r:wtmp_t:s0', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) fsetxattr(r0, &(0x7f0000000200)=@known='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:wtmp_t:\x00\x10', 0x18, 0x0) write$P9_RWALK(r0, &(0x7f0000000240)=ANY=[], 0x0) 21:02:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000578000)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000800), &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000700)) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@known='system.posix_acl_default\x00', &(0x7f00000003c0)='\x02\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf3\x00\x00\x00\x00\x00', 0x4, 0x0) 21:02:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:44 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:44 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r1, 0x0, 0x1f) 21:02:44 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 349.075018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:02:45 executing program 4: sched_setscheduler(0x0, 0x3, &(0x7f0000000100)) r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, &(0x7f0000000180)='\"'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)='^'}) 21:02:45 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r1, 0x0, 0x1f) 21:02:45 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000040)) 21:02:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x10\x00', 0x80000000008002}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 21:02:45 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000040)) [ 349.741207] binder: 10714:10722 ERROR: BC_REGISTER_LOOPER called without request [ 349.749201] binder: 10722 RLIMIT_NICE not set 21:02:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(0xffffffffffffffff, r1, 0x0, 0x1f) 21:02:45 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:45 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000040)) 21:02:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=&(0x7f0000000040)="4467db7db922a533ca5b1d469b3135b13ae8750dce2535e9abde29528b60428e"}) 21:02:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1f) 21:02:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, 0x0) 21:02:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xb9\xb3\xf8h>\xcf\x89\xde\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91\x14\xc5q\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.*,\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\xc3\x9b\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\xffY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\xaa\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd4\xcbW\b\x83\x85$\x82\x86\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xe6\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x80x\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xafL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xcd\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xdf\xa0\x8e') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x12, r0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)) 21:02:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:47 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x0) 21:02:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=0x0}) 21:02:48 executing program 5: open(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\xef\xa8\xc1\xc5\xb8\xfe\xcc?Hl3\x06\xda&\x06\x00\x00\x00\x8f)Z\xc8\xbcp\a\x00\x00$\\\x06eZ3&\x1aq2G\x85\x1d\xc0\xd9\xc5\xe6\xe8\xb6z\xea7\xaaf\xc0\x0e\x82\x03F\xca\xa3\xb7\xc2\xdd\xb6\xa4') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x2000027c}], 0x1, 0x2000107c) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 21:02:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000000089f1, &(0x7f0000000000)={'ip6_vti0\x00\x00\x02\x00', @ifru_data=0x0}) 21:02:48 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x0, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00\xe6{\xc0\x00\xb6v\xf7\xcc{\x96\'\xd5\x92\x86\x92\x81\x97X$\x13_}\x1dM') sendfile(r0, r1, 0x0, 0x0) 21:02:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, r1) 21:02:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:49 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x0, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x40000000009) 21:02:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:49 executing program 0: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0x14d}]) 21:02:49 executing program 5: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() clock_adjtime(0x0, &(0x7f0000000240)={0x8001}) memfd_create(&(0x7f00000000c0)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\x1d9\x03\xc2Vb\xe8*l\xdcC\xeb\xa6\xe4\x12$\xd1\xa3zz\x85\xf4\x1e\xcc\xfc\xf6\xb6__\xca\xef\x1b\x9d\x0ePw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os\"\xfc\f\xfa\xfe', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000180)) clone(0x0, &(0x7f0000000780), &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)='`') ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000680)) ptrace$peekuser(0x3, r0, 0xff) 21:02:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xf, 0xd) 21:02:49 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:49 executing program 2: r0 = socket$inet6(0xa, 0x500000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00\x00\x02\x00', 0x10) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendto$inet6(r0, &(0x7f0000000140)='Y', 0x1, 0x41, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040), 0x8080400001) 21:02:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:50 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 21:02:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:02:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13W\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\x9b\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xb9\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c035", 0xd1, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x4, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, 0x0) 21:02:50 executing program 4: syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13W\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\x9b\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xb9\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:50 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x22) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 21:02:51 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write(0xffffffffffffffff, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:51 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13W\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\x9b\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xb9\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:51 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) lseek(r0, 0x7ffffffffffffffe, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x1, 0xc3}) 21:02:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:02:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13W\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\x9b\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xb9\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:51 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x1f, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000680)={0x7}, 0xffffff50) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640), &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4004}, 0x20044005) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)='\xe5&\x00', 0xfffffffffffffffc) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x3, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, 0x0) fcntl$getflags(0xffffffffffffffff, 0x408) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000400), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000300)={0x2}) 21:02:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\x9e\xd5T\xfa\aBJ\xde\xe9\xcb\xc6\x99\xec,\xa5v\xe5\x00\x00\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xd0\xcfsw\v\xd4$hG\xa1\x91NO\xb0\xaa\x9b\x15\xea\xa9K\xcd\x0ep\x0e\xd6;D3\x8e\x84\xadN\xc2\xf1\x1fo*\xdb\x8d\xc2\xfd\xb1\x821DoC\x14.\xbep\v\"1\xe8\xfc\xee\xd6\xb2*7<\x94\tgZ\xc8\xd0\xb503\x12?\xb3\x03}f$\x1a\xaf\xe0\xf8\x80\xe7\xa5\x1d\x1b\x03j\xde1ZTM%\x81\xfe\x86S\xd0\xcf\xf5Ci\xdf\x8c/\xce!\xdc\xb1\xcb\x96Vi\xf9\xa7SE\xac4y\xcdQ\xdc}\xe3d\xc9\xc2r\xc8>\xd9\xe6f\xca%\xaa\xd2\xe7\xa2n=lb\xd0\xf8\xb9\x06\\\xfc\xa3\x11\xc0m\aD\xdb&Z\xa0\xe4\x86p|Q\xfd\x10\x8c\fl\xca\xe6\xffB\'J\xf9M0\xfc\xe8\x83o\xf9\xd0\v\xdd') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0xc020660b, 0x72fffc) 21:02:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:51 executing program 2: fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:51 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:52 executing program 2: r0 = syz_open_procfs(0x0, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000340)='\f\xcd\x80\xbf\xcd\xbd\xfb\x8bwa\xc1WvU\xff\xc6\xb5%\xbd\n\x90\x9e\xa8\x94\xefC\x9f\xb1\xf4\x8arA\xa1\x88\xef\"/\xcd@\x19(\xb58\x88\xca\x8de*\xed\x89\x99\xa9*\xc3W&\xa4y]\xb5\x85P\xa7M\xf84\xcc\x91\xe7@\xdf\x8a\xc2*\x18\xd2:}\xae\xf6a\x02\x91\xf2\xc1\xc9\xcb\x90X0\xad\x02\xe9\x9b\xdd\x01\x8f\xfa\x9f\x16\x12pT1A\xcf.\x88\xf8b\x83e\x93K\x8ai\xb0|\xa6\xec\n\xf5\xe1|\xc6\x935\x92q\xaa\xfbv\x11\x02w/\xdb\xbe\xca\x94\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ftruncate(r1, 0x8000) write(r1, &(0x7f0000000040)="0600", 0x2) sendfile(r1, r1, &(0x7f0000000100), 0x400000fffe) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000003, 0x11, r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x444, &(0x7f0000000000)=[{}]}, 0x10) 21:02:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe8\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x36aa008d182c612f) 21:02:53 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:02:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f0000000180)={@void, @val={0x0, 0x84, 0x0, 0x3f}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @link_local, @multicast1, @dev, @multicast2}}, 0x2e4) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) 21:02:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13W\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\x9b\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xb9\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\xff\xff\x00\x00\x00\x00\x00\x00\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x00->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9f$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xe7C\bZ\x1d\x02G\xb2%W\x95\xc4\xcf\xba\x88\xce\x1e|Nh\xec\x80\xae\x93\xca \xcfG\x9c\xc9\x96~\x02\x06\xdb&|\x9cZ,\xea\xa6\x89\xc2\xab\xa9\xd1C\x8c\xa6\xe3\xc8{\xa4m\xbbV\xa4\aCy+\xc1\xd3h\xb9sbX/\x9a\xd6\xd2\xaf\x10;d\xc9M\xefH\x9aE?Z\x82\xcf\x86u$\xd5\v\x9bZ-o\xa5\x9f\x8b\x1b\x9f\xadd\xce\x0e\xb9\xb2\xd4\b\x82') fgetxattr(r0, 0x0, 0x0, 0x0) 21:02:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:53 executing program 4: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept(r1, 0x0, 0x0) r2 = gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000014) open$dir(0x0, 0x0, 0x0) tkill(r2, 0x1000000000016) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 21:02:53 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ftruncate(r3, 0x208200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) read(r0, &(0x7f0000000240)=""/17, 0x11) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r4, 0x0) open(0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 21:02:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) unshare(0x0) readv(r0, 0x0, 0x0) [ 357.313451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:02:53 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 21:02:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/fib_trie\x00') read(r0, 0x0, 0x0) 21:02:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, 0x0, 0xdd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 21:02:53 executing program 0: r0 = socket$inet6(0xa, 0x400000000000803, 0x1) ioctl(r0, 0x400001000008912, &(0x7f0000000500)="0a5c2d023c126285718070") r1 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r1, 0x8918, 0x0) 21:02:54 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 21:02:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) 21:02:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) 21:02:54 executing program 0: 21:02:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(r1, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32]], 0x4451417f) fchmod(0xffffffffffffffff, 0x10) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)) 21:02:54 executing program 4: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:02:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x0, 0x0, 0x1, 0x3, 0x9}, 0x20) 21:02:54 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 21:02:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xffffffb2) fcntl$setstatus(r1, 0x4, 0x3ffff) io_setup(0x7, &(0x7f00000002c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) io_submit(r2, 0x1d6, &(0x7f0000001600)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) tgkill(0x0, 0x0, 0x0) pwritev(r1, 0x0, 0x0, 0x0) 21:02:54 executing program 4: 21:02:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:55 executing program 2: 21:02:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) connect(r4, 0x0, 0x0) connect(r1, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x86) 21:02:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xf1\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10r\x1e\xe2\xdbjt\xe33&S') fcntl$setstatus(r0, 0x4, 0x5ffe) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x408000000006100) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8000fffffffe) pread64(r0, &(0x7f0000002000)=""/4096, 0x1000, 0x0) 21:02:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:55 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev'], 0x0, &(0x7f0000000580)='\xb3\xb8\x15W\x13\xfb\x18\xde\xa12T\x03\xcfIE\x8e\xa0U\xd7Y\x19\x82\x90=I\x1d\x14\xc2\xe9\xcb\xc3\x9e\x8b\xf7\x05\xc2\x1dL\xc6\xc5p\xba\x1b\x1b\x03\xc6\xdb@\x04\f\x16:m\xee\x93)\xd6\x03\x00\xa8:\x02\xef!\x19\x95}mM\x06\xf7\x9c])\xc3\xf9z\xcb\xbb\xd1\xa0\x03H\x98\x93\x97\x12\xccc\x02\x0f1\x10\x7f1\xc3\xa7\xeak\x05Z=\x9c\xd0XE\x1e\xef\xeen\xbd\xb05x1yga\xe1o\x81\x0e$R\xbe}\v\xbb\x99\xee\x89\a9\x87?-\xe4\x81\x87B\x83B\xa5\xe9_ \x86>\xd6\xafH\xbf\x04J\xd8s\x94bZ$B=_\xef\xeb\xc9=:J\x96\xd5\x82\xc66\xa0\xbc>\xc3\xfa\x80\x85M\xebA\xda\xa2!\xd1.\xd5\xbd\xc1\xae\xaa\xbe\xd9\xdc\xbb\x85\vG\xa9\x8a\xb2VI8z\xb1\x1d{ Z\a\xb9\b+sl\x17\xd0\x9a\x9cym\xf0\xd8\xa6\x7f\x83m6\x16\xdbGf\x17\xe63R\xfef\xf4\x19\x99\xf9\xc3@[gp\xa3\xbf\xa7\xd9\xf8\x05\xbc`\x9a\x85\xd5\xd6\xef\x96U\xdaL\xaa[\x8cs\"\xdb2\a\xe1', 0x1004, 0x0) 21:02:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:55 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 21:02:55 executing program 4: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(r0, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32]], 0x4451417f) fchmod(r0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) 21:02:55 executing program 2: 21:02:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) poll(0x0, 0x0, 0x1000) 21:02:55 executing program 0: 21:02:55 executing program 2: 21:02:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) poll(0x0, 0x0, 0x1000) 21:02:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:55 executing program 0: 21:02:55 executing program 2: 21:02:56 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 21:02:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) poll(0x0, 0x0, 0x1000) 21:02:56 executing program 0: 21:02:56 executing program 4: 21:02:56 executing program 2: 21:02:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:56 executing program 0: 21:02:56 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 21:02:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:56 executing program 2: 21:02:56 executing program 0: 21:02:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:56 executing program 4: 21:02:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fchdir(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000280)=ANY=[@ANYBLOB="02"]) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010007, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:02:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:57 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 361.284608] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:02:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(0xffffffffffffffff, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchdir(r2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) write$selinux_attr(r1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(0xffffffffffffffff, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:57 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 21:02:58 executing program 0: 21:02:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(0xffffffffffffffff, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:58 executing program 0: 21:02:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81806) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:58 executing program 4: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:58 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x1ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000000440)='.', &(0x7f0000000b40)='mslos\x00\x1dukp\xf8\x8f\xa3\xeb|v1dk[\x1d6y\xb6W8yr\x90&/2\xb6O\x87\xed\xbd\'\x05_\xae\x8e\xa5$R\xfb\xae\x1a\xfetn\xc65\x1c\x19\x9f7Fy\"\x95\xc5(\x0fq.K\xb6\xca\x11\xd3\xf7\xefm\xae\xabM\x1f\xee\xd4\x00&\x8d\xc6\x83\xa8\x10\xca\xdd`\xd0)4\x1f\x7f\x17\x8a\"\x8fZq\x1a\'\x1c+f\xa9\xc0\xec\xff\xdcE\x7fl[', 0x5010, &(0x7f0000000340)='U\x7f\xa7\xf8') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, &(0x7f0000000580)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 21:02:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:59 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, 0x0, &(0x7f0000000080)) 21:02:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)) 21:02:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x81806) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchdir(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, 0x0) 21:02:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) 21:02:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81806) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:02:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:02:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:02:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f00000002c0)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00000007", 0x27) [ 363.944618] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 21:03:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81806) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:03:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff3f, 0x200007ff, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='reno\x00', 0x5) shutdown(r0, 0x1) 21:03:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x81806) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchdir(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:03:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:00 executing program 2: setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 21:03:01 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) 21:03:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:01 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000001600150700000000000000000a00000078b3a0c2d27de37addda8e78b88570c42248042204347779657a2c0c87bce37aa5862923dd43e436d149242007c26ef8536e7623f93a42ea8784020000000000000069f9b6d3f7703828553b02000000541382b54f4f0adc3c13bcd513", @ANYRES32=0x0], 0x2}}, 0x0) 21:03:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x81806) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 21:03:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:01 executing program 0: r0 = socket$inet(0x2, 0x400000003, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000001"], 0xd}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) 21:03:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write(r0, 0x0, 0x0) write(r0, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 365.680455] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! 21:03:01 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) setxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='user.syz\x00', 0x0, 0x0, 0x0) 21:03:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b", 0x66) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:01 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 21:03:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000700)={0x78, 0x0, [0x10000000000047f]}) 21:03:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b", 0x66) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:02 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000180)={0xfffffffffffffffe}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) timer_delete(0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) 21:03:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x19d}, 0x20) 21:03:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 21:03:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49", 0x99) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:02 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 21:03:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49", 0x99) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:02 executing program 0: clone(0x2102001fbf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='smaps\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 21:03:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 367.038680] input: syz1 as /devices/virtual/input/input12 [ 367.044533] input: failed to attach handler leds to device input12, error: -6 21:03:03 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 21:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x9, 0x4, 0x40000000000001}, 0x181) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), 0x0}, 0x20) 21:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) 21:03:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49", 0x99) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 367.205198] input: syz1 as /devices/virtual/input/input13 [ 367.264414] input: failed to attach handler leds to device input13, error: -6 21:03:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x02\x00', 0x20000015001}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f0000000400)={@void, @val, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x44, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0x7c) 21:03:03 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000240)={{0x1}}) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f6669acb7c20e24a311ab8e11a0126c65302000ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f0a57bf2239520ab81bf03c64305d05c845f0883b9a897736837d7fceaacb71ca63f8397d3408c641914278fb2f0800465b164defc36ea67d839fcca85f6077afc6f9f8024e8af1d583ab612e9777cab088294d0e1155075882ad600d511d76974639cf06def21435d8a830eda88fc9e1b6d373"], 0xc9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)) 21:03:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502b", 0xb2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:03 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:03 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) [ 367.521222] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 367.528129] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:03 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 21:03:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x8, 0x4) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="6f83000000bfffffffff"], 0xa}}, 0x0) [ 367.823394] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502b", 0xb2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:04 executing program 3: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800) fallocate(r0, 0x0, 0x0, 0x1000102) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(0x0, 0x0) 21:03:04 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc0046209, 0x0) close(0xffffffffffffffff) [ 368.214832] binder: 11606:11607 ioctl c0046209 0 returned -22 [ 368.225905] binder: 11606:11609 ioctl c0046209 0 returned -22 21:03:04 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x40}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 21:03:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x2) 21:03:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:03:05 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) 21:03:05 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 21:03:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502b", 0xb2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 369.314328] input: syz1 as /devices/virtual/input/input14 [ 369.390115] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) 21:03:05 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 369.488925] input: syz1 as /devices/virtual/input/input15 21:03:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:05 executing program 4: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08060006080006040001ffffffffffff89060003aaaaaaaaaa00ac1414aa2f235cdb862824e6982d9e1f93f177359a34a021e92fba1f37a1173c142756a83bcf7f4c285e79cf272f44c8853ebca286cac8733445f9fc2207d1986d29927836c14c955ada2bc98d029cab9f11cf"], 0x0) 21:03:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c", 0xbf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:05 executing program 2: r0 = socket$packet(0x11, 0x2000800000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'ip6gre0\x00\x00\x00\x00\x00RK\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000), 0x11d}}], 0x40000000000001d, 0x0) 21:03:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 21:03:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='statm\x00') sendfile(r0, r1, 0x0, 0x1) 21:03:06 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 370.053702] input: syz1 as /devices/virtual/input/input16 [ 370.088144] input: syz1 as /devices/virtual/input/input17 21:03:06 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:06 executing program 2: r0 = socket$inet6(0xa, 0x500000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00\x00\x02\x00', 0x10) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendfile(r1, r2, &(0x7f0000000040), 0x8080400001) [ 370.655808] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x7}) 21:03:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:07 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) socketpair(0x0, 0x0, 0x8, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x2, 0x2000000000000}) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002bc0)={0xffffffffffffffff}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 21:03:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c", 0xbf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:07 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(r0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)) 21:03:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:07 executing program 0: symlink(0x0, &(0x7f0000000000)='./file0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) setxattr(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="757365722e2700b3be7050a92777c1bdb048be853b6264027b284a35b215bfe45237c8be59230a219973b0ea7578757978fe"], 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syncfs(0xffffffffffffffff) shmget$private(0x0, 0xe000, 0x0, &(0x7f0000ff0000/0xe000)=nil) lstat(0x0, &(0x7f00000004c0)) getgroups(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) flistxattr(0xffffffffffffffff, 0x0, 0x0) setpriority(0x0, r2, 0x636) [ 371.266139] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:07 executing program 4: symlink(0x0, &(0x7f0000000000)='./file0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) r2 = shmget$private(0x0, 0xe000, 0x0, &(0x7f0000ff0000/0xe000)=nil) lstat(0x0, 0x0) getgroups(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) shmctl$IPC_SET(r2, 0x1, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ff6000/0x1000)=nil) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) setpriority(0x0, r3, 0x0) 21:03:07 executing program 2: pipe(&(0x7f0000000000)) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2800, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x2) r3 = dup3(r2, r1, 0x80000) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) fcntl$setstatus(r3, 0x4, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000500)) ioctl$KDSKBLED(r0, 0x4b65, 0x0) semget(0x2, 0x0, 0x0) open(&(0x7f0000001dc0)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ptrace$getenv(0x4201, 0x0, 0x6, 0x0) 21:03:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c", 0xbf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'ip6gre0\x00\x00\x00\x00\x00RK\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000), 0x11d}}], 0x40000000000001d, 0x0) 21:03:08 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f0000003900)={&(0x7f0000000240)=@un=@abs, 0x80, &(0x7f00000038c0)=[{&(0x7f0000000380)="16710303000000000000443505f1a26a", 0x10}], 0x1}, 0x0) 21:03:08 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80340000005e510befccd7", 0x2e}], 0x1}, 0x0) 21:03:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92", 0xc5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 372.124062] netlink: 'syz-executor2': attribute type 29 has an invalid length. [ 372.132043] netlink: 'syz-executor2': attribute type 29 has an invalid length. 21:03:08 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x20001, 0x2, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x20) 21:03:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:08 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, 0x0}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)='th\b\x00aded\x00', 0xfdef) [ 372.331205] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92", 0xc5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:09 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f00000005c0)="bd", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x40000) sendmsg$kcm(r0, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) 21:03:09 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d800200006c5e510befccd7", 0x2e}], 0x1}, 0x0) 21:03:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92", 0xc5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 373.058844] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 373.066689] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 373.109733] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 373.117434] netlink: 'syz-executor4': attribute type 29 has an invalid length. 21:03:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a56", 0xc8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) write$UHID_INPUT(r2, &(0x7f0000004240)={0x8, "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", 0xfffffffffffffdd1}, 0xfffffe48) sendfile(r0, r2, 0x0, 0x20020102000007) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) [ 373.234891] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00\x00\x00\x00\x00\x00\xe2\xff\xff\xff\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv4_deladdr={0x2c, 0x15, 0x703, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'veth0_to_bridge\x00'}]}, 0x2c}}, 0x0) 21:03:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a56", 0xc8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x0, 0x5011, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a56", 0xc8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:03:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) close(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:03:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = eventfd2(0x0, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x280080) sendfile(r0, r1, 0x0, 0x2008004fffffffe) memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) 21:03:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b28", 0xca) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 374.570095] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:10 executing program 0: r0 = gettid() pipe(&(0x7f0000000380)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x15) 21:03:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b28", 0xca) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ae6d10c821ed529abfb222d9c779d1c627836459058b7fb12e5eabe3258ad713a7d3b2eba547da6e1ecb37bb9a284e3aa674fd3dd337e7520a163c288e75f7ab3fa585e89b1d04f3e8f7bc78ce325532d9bad890b99d5d2b482a2653bc0748e4870f207cee97f8684b8a8d3ea7f52001ba7134f4d51c69af5f4d1386857dda3bedcaadcf12270d243e72dc638b17aff81151f7a7b872b60e2237edd713c7b492e0ccc6b8a73caacaa6c7fe78487e4ed2bf098b6be8aeb15731cefbf5c44b73fe9a490c73df1aabad53aa843c2c677f127e4109e22c0fcd1e"], 0xd8) 21:03:11 executing program 2: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x1) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000402080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 21:03:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfdef) 21:03:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') openat$cgroup_ro(r0, &(0x7f0000000400)='c-0acct.usag\x04_all\x00;\xbf\xf3\x1d\xbbP\x03\x00\x00\x1b\xa6*\xfa\xc7YD\b($\xd5\xbb!\xcd\x19\x01\xed\xfb\xf4\x8dhh\x1f\xa0\xe6\xd7\x14\xe2\xa0x\x8e\xf1\x83\x8a\x1cK\xb0\x81\xa8\xcfe3T\x1a\xc0zZ\xc5\xacpP\xb5&HgX\x99D\xbc\x99P!!\xb4\xc6\x1c\x92\b\x0fi\xa6\x9e\xec\xd5\"\x16\xdb\x01\xc7-\xde;<\xd4Qe\b!}YKI\xbc\xffeM\xa8\x99?\xcd\x99\x94\x1e1\x1f\xd9\x92o\x05`\x8c\x17\x8ae\x01\x88at\xe2f\x93D\xe6\x1fRK0Y\xd8I\x97\x81\xadQ\xd1\xc9\xebD/\xc7\x1a\xbd\x01\xb6\xa9q\xc6\xa5M\xc9\x7f}\xcc|\xbc\xe7\x05\x96\xf1Q\xac\x1d/\v\xd28$d\x12\xc4\x19h\xf9\x9dX\x98\xee\xc7\xda\x1bENU\x91\xb1#\xe3M,\xc1\x80\xad\x825\x9bU8\xf5\xc3\xa8\xbd\xfa0\x9a\x0e|\xbd\xcdH\x93\xed\x19<\x1eFIr\x06\xa0\x96\xa8\xf1\x19\xb6p\xe6\xa6\xdb\xa7\xab\x9eP\xeeO\x9a\xf0 \xa9u>/I\x7fzY\x05\x04\x85\xee\x06%\xdc\xba\xc6\v\xdcS|\xd9\x04\x17\xd9\x8d(\x17\xa1\x7f\xb1\xeb\xf9\x14\x1fM\x10]\xfe0,x\'\x1c>\x02\x04\x19\xcc\xd1\xe5\xd8.\x82\x1b;\x99\xd3\xb6L\x96\x13K\xa3\xa8\xf8\xe0\xa8\x8e\xe8\x93i\x06]\x15\x02\xc5\xca\xb9i\x96n\x9be2\xc4\xc6\xban\xa9\xad\xb1\a\x81w\xe8\xf8$s\xc1-', 0x0, 0x0) 21:03:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:03:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0xc}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 21:03:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b28", 0xca) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x10507e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81006) sendfile(r0, r2, 0x0, 0x80003) 21:03:12 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xac1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xffG\xeb\'\xa19\xf1\x93\"\x80\x7fG3\xc1E\xe6e6\xc6\xc2u\x01% \xe7+0\x97\x84;N\xda\xc4\x80\xc3\xb18N\xbf_\x19_ \xd4_Y%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) [ 376.013330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 376.192809] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='maps\x00\xa7\xad\xd7\x0f\xc7\xef%\x8a\x1e\xa0\xbc\xf6]\xdb8\xa3\x06T=\x9e\x9c\x06\xecDx\x94\xc4\x01,\f\x99\xc9{\x80=\xb7\xc4\x12\x0f\xeeo\x9e\\\xb7\xf0\r\xd5\xa2a\x1d\xd9\x8e5txv\xb0\bc\xce4\xc7\x97F\xc1\xc0\xb30\x12I\x1f\x90B\x131\x89\a\xa4\xe1\xed<\rr\xb2\x92\x1f\x11\xafi1\xb2\x99\xef/\xc2K\xc9BT\x82\xb26\x7fa\x96\xbc\x9f\xad\r[\x8a?\xb0\t\x03\xe3`\xe6\xc1\xfd\xb1\xd2\a\xa7\x14\xa3\xdbX\xefja\xd1EK\xb2\xee%\x91\xd2\a\\\xe2\xc9\x90v\xe7\xd8>e\x83\x11M=\x8f\xca`\xbd\x19\xfd(Q\xa2\xf3\xbeEa\xf7\xeb\x9cZ\xa2} \xf9\x1c\xa9q\xce\xa1\x94B\xd0\xd2\xf9V\xb8z\x91\x14\x95\xfd$3\x01\x9b\xbf\xf6k]DY\xb6\xb0S\x13\xd5\x8f\xb1\a\x02\x87\xb6~e*%L\x921^+\x16-\xad\x120F\x8f\xaeP\x86\x8aM\x80.\x14\x0f\x1fzM\x94\x84\xff\xacg:\xa7\xfca\xc4\x96\xea\xf4vVJ\xb2\x87s\xe31\xe1\xee\xd4o\x86\xfe\x84\t\xc2\xfd\"+\xed\xfb\xee\xd7\xe1\xdb\\PI\xae\xbf\xe94\xd9\xfdH\xb1\xb5Z\xcbJVk\rc\x99c5\xd8o\xafk\xd8\x1c\xe6\f\xd7$\xb4\\DJ\x8a\x1c\xe0\x04\xb5\t\xecc\xda\xe2\xe4\xe6(\x9c\x9d\xf0\xc6\xda\x8f\xa5\x8a\xa8@\x19p\xd2\x94\x9d\xa2\xdb\xac\x91\x888\xb8\x13\xdce\x87\\\xbe\xf20\x1d\xf7\x9c$f\xda\f\xfd\x06\x81\xe4\xc4|\xf3W\x90\x00\x03\xac\x0e\x0etu\x1a\x9b\x04\xce\xafah7T\x05S< R\xa0\xb7\xc4\x0e6\x9f&\x94A\x01L\xf5\x83+Z\xa6\xe2\x87\xec\x86\xe3\xda\x8b>\xceT`o\x18\xd1\x05\x9f\a:6\xc4a\xac\xe3E\xe6\xec\xc5QS\xcb\xc22i\xb6\xf5e\x88\xed\x9e\xd5\xad.7\xe5\xfc\xa6\xb7i\x0f\x17`]\xc5:f\x11C}7`\xf6S\xb4v\xdb\x1082\x81.\\\xc2\xd5\x12\xefl\x13\x96\xf6\xc9!\xea\xbd\xa6y\xdc\xc6\xf8\x8eC\xe7\xe9I\x8e\x95\xf7\xedC\x80:\xd3I\x8fC_\xab\xa9.\xa9~\xbfL\x06R\x9a\x92&1\x96Wd\x011\xc4\x85#\xf8\xb0\xd2\x8c\x86\x91\xc2\xfe2MI+\xc1w9{\xac\xe8\xb6\x13!\xb4\xf9\xaa`\xdf\xad\x05W\x1btA\x9c\xa0L}\xa9\x05\xde=\v\xf6\xed\x05;j\nfE0\a\xadY\xf3\xbd\xff\xb05f\x01\x95\xa8V\xd1\xfe\x1b\xa07\xa1\x12G\xed$z0V[\xb26\x1c0\xa3h\xc5\xadQ\x05\xca\xc5\x85z/\xa0\xa8k\xb0\x8d+n\x8f\x97\xe2i\xf6M\x15\xafh\xde_E\x03\x1c\xc3\x11w+\xa0\x81r\x1bt\x90\xe2\x8cq\x11\xaao\xbfgRy') close(r0) 21:03:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[{0x10}], 0x10}, 0x0) [ 376.283386] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:12 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f000000c740)={&(0x7f000000c480)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000c600)=[{&(0x7f000000c500)=""/73, 0x49}], 0x1, &(0x7f000000c640)=""/251, 0xfb}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c780)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2}, 0x48) 21:03:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(0x0, 0x0, 0x7, r1, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() socketpair(0x1, 0x80002, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x78f, 0x0, 0x6, 0x0, 0x0, 0x1ed637c0, 0x0, 0x40, 0x0, 0x4, 0x3, 0x4, 0x0, 0x3f, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x3f, 0x1000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7199, 0x0, @perf_config_ext={0x1}, 0x0, 0x6, 0x9, 0x7, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) close(r0) 21:03:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:03:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x710000) 21:03:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0) 21:03:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='stack\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 21:03:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 377.792826] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendfile(r0, r0, 0x0, 0x2000005) 21:03:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup3(r0, r1, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000480)) 21:03:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) close(r1) 21:03:14 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141045, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x10507e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000174, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81006) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14, 0x0) sendfile(r1, r4, 0x0, 0x80003) 21:03:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:14 executing program 4: socketpair(0xf, 0x3, 0x2, 0x0) 21:03:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) 21:03:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='stack\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 21:03:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:15 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) getpriority(0x2, 0x0) 21:03:15 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='stack\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 21:03:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) close(r1) 21:03:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000480)=@vsock, 0x80, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x3ff}, 0x102) 21:03:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:15 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c05, 0xffffffffffffffff) 21:03:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:15 executing program 2: clone(0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0) getuid() 21:03:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000005c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) close(r0) 21:03:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000400)=0x1, 0x4) sendmmsg(r0, &(0x7f0000002600)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000001000)='\r', 0x1}], 0x1}}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1000000000003, 0x0) 21:03:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00"], 0x1e) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00"], 0x1e) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) close(r1) 21:03:16 executing program 2: memfd_create(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) clone(0x100002122001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffffffffffffffb}]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 21:03:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000003000500000000000200423b000000000012b478407f8604"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000003, 0x0) 21:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00"], 0x1e) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000480)=@vsock, 0x80, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x3ff}, 0x102) 21:03:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff0a, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) read(r0, &(0x7f0000000380)=""/98, 0xfffffffffffffd5e) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) shutdown(r0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 21:03:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000000000)='GM\xdb\x98,\x02\xabH\x94T\xa3\xf9\xff\xae[\x0f\xdc\xfd\xfc\xfd\xe8g\x99\xb7\xf4\x02\x8a\xfbD\x8c\aw;i\x012\xa6P\xb0\a2\xeb\a/\x12\xa9\xb3\xe2\x91,GU\x80\xe3\xb2'}, 0x48) 21:03:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000"], 0x2d) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000"], 0x2d) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:17 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000100)=@pppoe, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000600)=""/160, 0xa0}, 0xad}, {{&(0x7f00000006c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)}], 0x1}, 0x58}, {{&(0x7f0000000ac0)=@nl=@proc, 0x80, 0x0}, 0x9}], 0x3, 0x40002020, &(0x7f00000007c0)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000d40)) open(0x0, 0x684600, 0x10) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000540)=ANY=[], 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e23, 0x0, @mcast2, 0x10000}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000540)={0x8, 0x0, 0x1}) lsetxattr$security_selinux(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x2) set_robust_list(&(0x7f00000000c0)={0x0, 0x1000}, 0x18) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000400)={0x40, 0x3, 0x1}) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x800, @ipv4={[], [], @loopback}, 0xfffffffffffffffe}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000005c0)={0x3, 0x8001, 0x0, 0x6, 0x400, 0xffffffffd4d10055}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000009c0)={'broute\x00', 0x0, 0x3, 0x95, [], 0x1, &(0x7f0000000840)=[{}], &(0x7f0000000900)=""/149}, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000800)='./file1\x00', &(0x7f0000000880)='security.SMACK64TRANSMUTE\x00', &(0x7f00000008c0)='TRUE', 0x4, 0x3) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) syz_open_procfs(0x0, &(0x7f0000000480)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) socket$nl_route(0x10, 0x3, 0x0) 21:03:17 executing program 2: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0) 21:03:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000"], 0x2d) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:17 executing program 0: rt_sigpending(&(0x7f0000001c40), 0xfffffffffffffca8) 21:03:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000"], 0x35) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:18 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 21:03:18 executing program 2: [ 381.988378] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:03:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:18 executing program 0: 21:03:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000"], 0x35) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) dup2(r0, r1) 21:03:18 executing program 2: 21:03:18 executing program 0: 21:03:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000"], 0x35) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff0a, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) read(r0, &(0x7f0000000380)=""/98, 0xfffffffffffffd5e) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x5) sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) shutdown(r0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 21:03:19 executing program 2: 21:03:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003"], 0x39) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:19 executing program 4: 21:03:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:19 executing program 0: 21:03:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003"], 0x39) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:19 executing program 4: 21:03:19 executing program 0: 21:03:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:19 executing program 2: 21:03:19 executing program 4: 21:03:19 executing program 0: 21:03:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003"], 0x39) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:19 executing program 2: 21:03:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:20 executing program 4: 21:03:20 executing program 0: 21:03:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000003800030000"], 0x3b) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:20 executing program 2: 21:03:20 executing program 4: 21:03:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r3 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) 21:03:20 executing program 0: 21:03:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000003800030000"], 0x3b) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:20 executing program 0: [ 384.720874] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:20 executing program 2: 21:03:20 executing program 4: 21:03:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000000000000000000000000000000000000000000000003800030000"], 0x3b) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:21 executing program 0: 21:03:21 executing program 4: 21:03:21 executing program 2: 21:03:21 executing program 0: 21:03:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 385.200721] cgroup: fork rejected by pids controller in /syz5 [ 385.271529] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:21 executing program 2: 21:03:21 executing program 0: 21:03:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:21 executing program 4: 21:03:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:21 executing program 2: [ 385.713173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:21 executing program 0: 21:03:21 executing program 4: 21:03:21 executing program 2: 21:03:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:22 executing program 0: 21:03:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:03:22 executing program 2: 21:03:22 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ae6d10c821ed529abfb222d9c779d1c627836459058b7fb12e5eabe3258ad713a7d3b2eba547da6e1ecb37bb9a284e3aa674fd3dd337e7520a163c288e75f7ab3fa585e89b1d04f3e8f7bc78ce325532d9bad890b99d5d2b482a2653bc0748e4870f207cee97f8684b8a8d3ea7f52001ba7134f4d51c69af5f4d1386857dda3bedcaadcf12270d243e72dc638b17aff81151f7a7b872b60e2237edd713c7b492e0ccc6b8a73caacaa6c7fe78487e4ed2bf098b6be8aeb15731cefbf5c44b73fe9a490c73df1aabad53aa843c2c677f127e4109e22c0fcd1e"], 0xd8) socket$kcm(0xa, 0x805, 0x0) 21:03:22 executing program 0: [ 386.308716] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:22 executing program 0: 21:03:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:03:22 executing program 2: 21:03:22 executing program 4: [ 386.753425] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:22 executing program 0: 21:03:22 executing program 4: 21:03:23 executing program 2: 21:03:23 executing program 4: 21:03:23 executing program 0: 21:03:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:03:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:23 executing program 2: 21:03:23 executing program 4: 21:03:23 executing program 0: [ 387.550349] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:23 executing program 2: 21:03:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:23 executing program 0: 21:03:23 executing program 4: 21:03:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:23 executing program 2: 21:03:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:24 executing program 4: 21:03:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:24 executing program 0: [ 388.232153] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:24 executing program 2: 21:03:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, 0x0, 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:24 executing program 0: 21:03:24 executing program 4: 21:03:24 executing program 0: 21:03:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, 0x0, 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:24 executing program 2: 21:03:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:25 executing program 4: 21:03:25 executing program 0: 21:03:25 executing program 2: 21:03:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, 0x0, 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, 0xffffffffffffffff, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:25 executing program 4: 21:03:25 executing program 0: 21:03:25 executing program 2: 21:03:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 389.409293] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:25 executing program 4: 21:03:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:26 executing program 2: 21:03:26 executing program 0: 21:03:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) 21:03:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:26 executing program 4: 21:03:26 executing program 2: 21:03:26 executing program 4: 21:03:26 executing program 0: 21:03:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000040)) [ 390.437993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:26 executing program 2: 21:03:27 executing program 4: 21:03:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:27 executing program 2: 21:03:27 executing program 0: 21:03:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) syz_open_pts(r0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 21:03:27 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:27 executing program 2: 21:03:27 executing program 0: [ 391.222104] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) syz_open_pts(r0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 21:03:27 executing program 4: 21:03:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:27 executing program 0: 21:03:27 executing program 2: 21:03:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) syz_open_pts(r0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 21:03:27 executing program 4: 21:03:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:28 executing program 0: 21:03:28 executing program 2: 21:03:28 executing program 4: 21:03:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, 0x0) 21:03:28 executing program 4: 21:03:28 executing program 2: 21:03:28 executing program 1: [ 392.420699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:28 executing program 0: 21:03:28 executing program 2: 21:03:28 executing program 1: 21:03:29 executing program 0: 21:03:29 executing program 4: 21:03:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:29 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:29 executing program 1: 21:03:29 executing program 2: 21:03:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:29 executing program 0: 21:03:29 executing program 4: 21:03:29 executing program 1: 21:03:29 executing program 2: [ 393.404587] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:29 executing program 0: 21:03:29 executing program 1: 21:03:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'lo:\x93\xf2\x90\xe43\x96\x96\x0e\x00\x10\x00'}) 21:03:29 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) munmap(&(0x7f000000e000/0x1000)=nil, 0x1000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) fchdir(r0) mlock(&(0x7f000000f000/0x3000)=nil, 0x3000) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfffffe3a) fcntl$setstatus(r3, 0x4, 0x6100) munlock(&(0x7f000000d000/0x3000)=nil, 0x3000) sendfile(r3, r2, 0x0, 0x100000001) 21:03:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 21:03:30 executing program 1: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000040000000040000083b1bdf7d546d07d35570007efe073c914f53b380002"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 21:03:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:30 executing program 4: 21:03:30 executing program 2: 21:03:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/unix\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00H\xe9p\x9cuG\x15\x06\xba\x035s\x86\xfd\x92\xdcms]\x83_3\xf7\x13\xab\xb6&d\xc3\x16\x98\xe6\r\xf7\x90\x9d$\xa7\xcb\f]\x85rM\x1d\x87\xea\x96\xad-s\xe84I\xf3\x02\x00*]\v\x19W\xb5&\xd9\xa6d\x03\xb8y\xac\xdc\xe9A\xd5a\xa47%\xbe:\x96Z\x02\xe0M\xa8a\x1c\x8b\xdc\xa5\x10\xee\xd7s\xb6\xd5\x8b\xa9\x01A9j\x82[#\x7f\x9a;\xeb\xfb\x14a{ChT\xcd\b\t\x01Z!$\xf7\x9f\xb13\bAZ\x8f\xfa7fJ\x83g.\xc3\xea\xd7\x1e\xb5\x1c\xe6\xd2\xf8\xb6\xfa\x86\x88L\xc6L\xbe6\x1c0\x02x\x0e\x04\xe4\x8b\xb8\xde') sendfile(r1, r0, 0x0, 0x4002d) 21:03:30 executing program 4: eventfd(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r3, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000280)="22368cf514293b2a7a6b28f08ced94f646be811a1d7f1b158aa8451c17aae3de962ac1ac4608e2ac63332bd6f4ba8b89851f44c9345504ee986af6e780af0dd4aaf17f79bfc0fd4014dff416ead621683ab42eca1f2d5f9df083759c3a78d19ee9f59efd522444293e4edda5e44c734a9fe7d69addad17be2991d23b9dada3e8f3735402a78c2e4c4e209fc3681a99da54193e1af44a7fb8c55fa55cd5023e38e045c3c403ba0e256eb0618c41e8ab9b3fd944f4ad0822cf571602f6984bce4fb5edf586eca82e575d4b5fd12875d0eaebe805d898a2") r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8000fffffffe) preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) write$FUSE_DIRENT(r3, 0x0, 0x0) 21:03:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\v\x00\xff\xff\xff\xf9\x00\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0xffffff8c}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x10000}) 21:03:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0xb3e60296ee421720, 0x0) open(0x0, 0x2000, 0x20) mprotect(&(0x7f000017f000/0x1000)=nil, 0x1000, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x2000, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000280)={0x9, 0x3f, 0x0, 0x7ff, 0x4, 0x9, 0x5}) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x20) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mkdirat$cgroup(r4, &(0x7f0000000080)='syz1\x00', 0x1ff) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000540)="30bcbc43a5339af8d07b91c61bc85bd9785f61a839e7cf491439a2e7ce22789c251d382a372962ef62011eb03419a0489eea75a1b60c654d51754bb04014d2defe9914ced4626a39f99b76b74b5a089105c26998eaefa99580a661c98d1d126e3a6def13c840c85273b3ff1e0d4fdb515dc120d76dd845cef979e6f4765ec12f258e5e9ee4caf4c9f6e0c55097df63e0fd45ebb045596b9a056bcb786872235226b3f60796") mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x6800) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) msync(&(0x7f0000204000/0x1000)=nil, 0x1000, 0x4) [ 394.488664] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398417f1a}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 21:03:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, 0x0, 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00\x009\xd5^\xd3') getdents64(r0, &(0x7f0000000140)=""/40, 0x28) getdents64(r0, &(0x7f0000000df0)=""/528, 0xff3d) 21:03:31 executing program 2: ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000500)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) add_key(&(0x7f00000003c0)='s\x02\x00\x00\x00\x00\x00\x00\x00\x00\'\x02\xdb>\xf1\xc6\xfeSR\xfd\xa2\xa5\x82bi\xf5\xcd\x88\b7\x1a*\xf2\x1e.e\x84I\xb3\f*b4\x12\vy\t\xcbc\xa6\t\xedJ\xbf\x19\xb9\x04y\xebb\xe7\xfa,\xa5\x1d\x0f\xb1\x92\xa4\x1d\xd5n\f\xb8\x14\xd6\xc4\x9b\xca\xd3,\xbar=\xd1J\xe8\xccQ\xcb\xd9l\xfc\x12\x90*\x9d\'\x99\xc0\xe2\x7fc/4\xb3n\x8e\x0e(x\xda\xec\xc7\xee\x18j3\x1b\x1a\x99\x16\xae\xb7\xda\xc4\x1eB[0m', &(0x7f0000000040), 0xfffffffffffffffe, 0xfe6f, 0x0) 21:03:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, 0x0, 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:31 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000280)='./file0\x00') mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x201000, &(0x7f00000002c0)) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f00000003c0)='./file0\x00') mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utime(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000500)) 21:03:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, 0x0, 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 395.646924] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='/\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xaa\xd9U\xa3\xc9?\x9d$\x8bF\xa7\xc9\x9e\xb3[@k\xf9\x18\xff\x01s\x9eV\x18{-\xb8\xf1\aD$tRq\x06 B\xfb8\b\x18n\n\x83q2\xf9\x10\x8cX0s\xa4\xca\x94\xb3\xe4\xe5\x87\x17\xfe+e\x9f\xa3\x90<{s\xbdf\xb8?^\xcc\nsa%x\x96\x88?\x1bC\xffN\xc0\xa1\xe36\xb9/pTa\xaf\v`\x82Zx4\xff\xd0\xa73\x9d\x85\xc5\x1b\x8d\xb7\xb4\xc0\xe4\xf4\tS\xdd-\x9f!\x10\xf0L\x9f\xdf\x84\x89\xea\xa9\x96', 0xc3, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='user.syz\x00') 21:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=@ethtool_wolinfo={0x7, 0x0, 0x0, "e793763f6ad1"}}) 21:03:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syz_tun\x00\x00\x00\x00\x00\x01\b\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x284}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x34}}, 0x0) 21:03:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001240)) 21:03:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000000008912, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = memfd_create(&(0x7f0000000180)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000040), 0xfffb) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000400)={{}, {}, [], {}, [], {}, {0x20, 0xfffffffffffffffe}}, 0x24, 0x0) dup3(r1, r2, 0x0) shutdown(r1, 0x1) [ 396.110458] device lo left promiscuous mode [ 396.136520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 396.143278] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 396.890138] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 21:03:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) r1 = inotify_init1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_tgsigqueueinfo(r2, r2, 0x34, &(0x7f0000000040)={0x0, 0x0, 0xffeffffffffffffc}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/139) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r3, 0x407, 0x80008) splice(r0, &(0x7f0000000240), r3, 0x0, 0x80004, 0x0) 21:03:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:33 executing program 2: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 397.608875] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:33 executing program 2: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 398.324444] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10001, 0x1100082) tkill(0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) gettid() sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) 21:03:34 executing program 2: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 398.378448] ptrace attach of "/root/syz-executor4"[7681] was attempted by "/root/syz-executor4"[12814] 21:03:34 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) renameat2(r0, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='.\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, &(0x7f0000000200)={0x0, 0x70, 0x8, 0x7fffffff, 0x0, 0x3, 0x0, 0x0, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x100000001, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x101, 0x0, 0x81, 0x7fffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x0, 0x8, 0x0, 0x5, 0x0, 0x6}) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') [ 398.598712] print_req_error: 250 callbacks suppressed [ 398.598734] print_req_error: I/O error, dev loop7, sector 256 [ 398.610120] buffer_io_error: 250 callbacks suppressed [ 398.610142] Buffer I/O error on dev loop7, logical block 32, lost async page write [ 398.634169] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:34 executing program 2: r0 = syz_open_procfs(0x0, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 399.371395] ptrace attach of "/root/syz-executor4"[7681] was attempted by "/root/syz-executor4"[12838] 21:03:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:35 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='hELG'], 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 21:03:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) munmap(&(0x7f000000e000/0x1000)=nil, 0x1000) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfffffe3a) fcntl$setstatus(r3, 0x4, 0x6100) sendfile(r3, r2, 0x0, 0x100000001) 21:03:35 executing program 0: socket(0x18, 0x0, 0x3) creat(&(0x7f00000000c0)='./file0\x00', 0xc9) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000007600000000000000ddffffff20000000000800000000000000000000000000000000000000000000506f4153a6f9"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c03577", 0xd2, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x4, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x4) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000002b00)={@ipv4={[], [], @multicast2}, @loopback, @dev={0xfe, 0x80, [], 0x1e}, 0x810, 0x1, 0x3ff, 0x100, 0x401, 0x80000}) 21:03:35 executing program 2: r0 = syz_open_procfs(0x0, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:35 executing program 2: r0 = syz_open_procfs(0x0, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 399.723120] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x4000000000008923, &(0x7f0000000700)={'eql\x00\x00\x00\xa9[\x00', @ifru_ivalue=0x62}) 21:03:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) [ 399.947423] print_req_error: I/O error, dev loop5, sector 0 [ 399.953919] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 399.962094] print_req_error: I/O error, dev loop5, sector 8 [ 399.967857] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 399.975672] print_req_error: I/O error, dev loop5, sector 16 [ 399.981524] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 399.989451] print_req_error: I/O error, dev loop5, sector 24 [ 399.995955] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 400.003784] print_req_error: I/O error, dev loop5, sector 32 [ 400.009629] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 400.017399] print_req_error: I/O error, dev loop5, sector 40 [ 400.023323] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 400.031085] print_req_error: I/O error, dev loop5, sector 48 [ 400.037013] Buffer I/O error on dev loop5, logical block 6, lost async page write 21:03:36 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 400.044810] print_req_error: I/O error, dev loop5, sector 56 [ 400.050672] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 400.058482] print_req_error: I/O error, dev loop5, sector 64 [ 400.064435] Buffer I/O error on dev loop5, logical block 8, lost async page write 21:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0xc}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) poll(0x0, 0x0, 0x1000) 21:03:36 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) [ 400.984903] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 401.053548] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) poll(0x0, 0x0, 0x1000) 21:03:39 executing program 1: socket(0x18, 0x0, 0x3) creat(&(0x7f00000000c0)='./file0\x00', 0xc9) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000007600000000000000ddffffff20000000000800000000000000000000000000000000000000000000506f4153a6f9f834b3be1cd4e1a314a1d6e3ad1c2f2b"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c03577", 0xd2, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x1, 0x9}}, 0x30) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x4, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x4) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000002b00)={@ipv4={[], [], @multicast2}, @loopback, @dev={0xfe, 0x80, [], 0x1e}, 0x810, 0x1, 0x3ff, 0x100, 0x401, 0x80000}) 21:03:39 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x19e) 21:03:39 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 21:03:39 executing program 0: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x800000000353) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f0000000600)=0xc) ptrace$peek(0x2, r3, &(0x7f0000000640)) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) r4 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x110007e) r5 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000003c0)={0x0, r5, 0xffffffff, 0x8, 0xfffffffffffffe00, 0xffffffffffff2502}) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000c80)) setrlimit(0x7, &(0x7f0000000440)={0x0, 0x2000004cd90ba8}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}, 0xa0) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000500)={0x0, {{0xa, 0x4e24, 0xb397, @ipv4={[], [], @remote}, 0x9}}}, 0x88) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) pipe(&(0x7f00000006c0)={0xffffffffffffffff}) gettid() fremovexattr(r7, &(0x7f0000000200)=@known='user.syz\x00') vmsplice(r7, &(0x7f00000014c0)=[{&(0x7f00000004c0)='0', 0x1}], 0x1, 0x0) 21:03:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) [ 403.170396] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, 0x0, 0x0, 0x0) [ 403.252159] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 21:03:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) poll(0x0, 0x0, 0x1000) 21:03:39 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00\x89\x01Q\xc7~\xffJ\xb1\xdd\xeb\x0f\x95\r\xd8\x05p\x14\xbf>\xd2xp\xdb\x11O\xea\xa4\x04XD\xf7\xfe\x0f\xe5\xe4\xaf\x83a\xaf\x11\x9eYs\x18{P\xdb\x8d\x10&\xfc`\xed\xd3\xc3\x92S\x80\x96\x803\'u\xc90k\xe3%\x91@:\xba\xb6\xfa\xd5 V\f=Z>~\xaf\xe6\xafv\x89\x83\x92\x1f\xd9\xef\x90\xf6\x04\x89nF@Y\xba\x9c\xe0p%\xacA\x158i\x04') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 21:03:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, 0x0, 0x0, 0x0) [ 403.603082] print_req_error: 201 callbacks suppressed [ 403.603104] print_req_error: I/O error, dev loop5, sector 640 [ 403.614395] buffer_io_error: 201 callbacks suppressed [ 403.614419] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 403.627528] print_req_error: I/O error, dev loop5, sector 648 [ 403.633595] Buffer I/O error on dev loop5, logical block 81, lost async page write [ 403.641410] print_req_error: I/O error, dev loop5, sector 656 21:03:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) poll(0x0, 0x0, 0x1000) [ 403.647481] Buffer I/O error on dev loop5, logical block 82, lost async page write [ 403.655379] print_req_error: I/O error, dev loop5, sector 664 [ 403.661380] Buffer I/O error on dev loop5, logical block 83, lost async page write [ 403.669278] print_req_error: I/O error, dev loop5, sector 672 [ 403.675292] Buffer I/O error on dev loop5, logical block 84, lost async page write [ 403.683236] print_req_error: I/O error, dev loop5, sector 680 [ 403.689191] Buffer I/O error on dev loop5, logical block 85, lost async page write [ 403.697823] print_req_error: I/O error, dev loop5, sector 688 21:03:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, 0x0, 0x0, 0x0) [ 403.703830] Buffer I/O error on dev loop5, logical block 86, lost async page write [ 403.711709] print_req_error: I/O error, dev loop5, sector 696 [ 403.717643] Buffer I/O error on dev loop5, logical block 87, lost async page write [ 403.725525] print_req_error: I/O error, dev loop5, sector 704 [ 403.731463] Buffer I/O error on dev loop5, logical block 88, lost async page write [ 403.739348] print_req_error: I/O error, dev loop5, sector 712 [ 403.745351] Buffer I/O error on dev loop5, logical block 89, lost async page write 21:03:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup3(r0, r1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000480)) 21:03:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x0) 21:03:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f00000003c0)="04c14e166692f0f8b17500955310060e92aec87568838306f9b1d5a4c28f202a7612b4a3061af475004929e1895a9a0b1d2e15f8e5d7f28c74bb39b9e767bf4a09906b31a08a3fecbc53aa2c0ce4b4573fcd2c46d5e31958259b193b4463bbf0ac4877c3450b1e7c07f2c11ba250779a95dcad49ca162269dfbf6fe2058e54f6dc3b23b3b0d6c9a5531316bc3ccea03528c2ed008927d02ff1176c4f14d61a4ee375d4c0882a26efd8510e98ff9c68d42071f7bee1b2c1fb5dcc14050000000ec24e7d702d235f86f69ea937939dbcd80d61d851934cce045e06330af73d36b92c", 0xe1) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x8000}}, 0x30) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000100)={{0x0, 0x2710}}, &(0x7f0000000000)) 21:03:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000180)={'sit0\x00\x00\x00\x00\x00\x00\xe5\x00', @ifru_addrs=@in={0x2, 0x0, @remote}}) 21:03:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0x803}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000200)={'eql\x00\x00\x00\xa9[\x00', @ifru_data=&(0x7f0000000040)="97aff5257fc5d93d4e08936ccff5c788ff451571d6e8799c79fdde9b00e02bb2"}) 21:03:40 executing program 4: r0 = memfd_create(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000380)=ANY=[@ANYBLOB="dbfdc0e0268f6941cbafe09bbd1302759aa1c781e6731e6cda979c4940213e772113cafd93688ea99f929968fc2083746eff6cd3576cc27a075edeea7a6983e5680630ab63c85a78b03ac971c7c52166be75ed8118279c4e82ca215f30d7c9f560d5369356b5ff429beffb5729270c5ace781f63ca1a9e08da9b"]) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000bc0)=[{&(0x7f0000000b80)='\v', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r4, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) geteuid() sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:03:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x0) 21:03:40 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='com.apple.system.Security\x00\xc5\xf2\xd8\x1f\xca!\x1f\xf5\x7fY\x12E\xd4k\x16\x06=?iw\xf09\x8d\xdd\xcf96*KY\xfa\xbd\x1eu\x1e\xbf\xd1\xcb\xca\n\x05W\xf7\xe9\x8f\xe6\xc1HM\xd3\xf5\xb1\xa40xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) close(r2) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000000000000000000000000000000000000000000000000380003000000"], 0x3c) sendfile(r1, r1, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(0x0, 0x0, 0x0) 21:03:41 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) chdir(&(0x7f0000000140)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 405.167827] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 405.217330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 21:03:41 executing program 0: r0 = memfd_create(&(0x7f0000000440)='bdev}trustedself}.\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\x0e(\x1a\xb4/\xb8\x97\xc0\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x98B7\xd0\x92\xef\x1c\x00\xb5\x17\x02o\x8b\xd7\xf2\xb0CjL@\x96\n\xb3\xf6\xbcH(\t\xf6\xbd\x82\xca\xa3G\x99\x19;5DR\x93\xb9\x92\xab^DW>\xef_\xd0\xf4#\xa5\xcf\xb3\x86\xf9\xcc\x99ln\xff\xde~`?\xde\xabD\x86q\xb6;\xecn\x93\x95\xaa\xba\xb4\xd0E\xf1\xad\x98**\x89\x7f\xaf\xa7\x10\xbe\x9eh\x1f0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f0000000280)="df121e5e7398e5232a200c20e4e7fe1a9201f2e34d81acd7cae0be4af8e0cf5f79dea6f4e35cfb0241ad30b3ca891bc6fd45060a3b2328ea566f03d6bf28eff4fd5202a4689f20ad155b1cd28cbeb956ae6341fdd186556f75188ac09cc92bea6750a6180fe1174d54a71d20650c3f09ed35d3f26f18abdcdb16eba56f5dc723", 0x80, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x101000, 0x0) 21:03:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xb6;\xaf\t\xa8M*\xe4;~y\xb2\x00\x00\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0\xa3\xd6^\xaf\x86\x0fm\xd4x\xdc\xae\xb6]\x94 +\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nb\xf8\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)}\xd0B\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x93\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l >\xff\xb5\v\x930xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) 21:03:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) 21:03:44 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\x9e\xd5T\xfa\aBJ\xde\xe9\xcb\xc6\x99\xec,\xa5v\xe5\x00\x00\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xd0\xcfsw\v\xd4$hG\xa1\x91NO\xb0\xaa\x9b\x15\xea\xa9K\xcd\x0ep\x0e\xd6;D3\x8e\x84\xadN\xc2\xf1\x1fo*\xdb\x8d\xc2\xfd\xb1\x821DoC\x14.\xbep\v\"1\xe8\xfc\xee\xd6\xb2*7<\x94\tgZ\xc8\xd0\xb503\x12?\xb3\x03}f$\x1a\xaf\xe0\xf8\x80\xe7\xa5\x1d\x1b\x03j\xde1\xd2TM%\x81\xfe\x86S\xd0\xcf\xf5Ci\xdf\x8c/\xce!\xdc\xb1\xcb\x96Vi\xf9\xa7SE\xac4y\xcdQ\xdc}\xe3d\xc9\xc2r\xc8>\xd9\xe6f\xca%\xaa\xd2\xe7\xa2n=lb\xd0\xf8\xb9\x06\\\xfc\xa3\x11\xc0m\aD\xdb&Z\xa0\xe4\x86p|Q\xfd\x10\x8c\fl\xca\xe6\xffB\'J\xf9M0\xfc\xe8\x83o\xf9\xd0\v\xdd') clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xa) [ 408.611555] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) lseek(r3, 0x0, 0x4000000000004) dup3(r1, r3, 0x0) [ 408.694265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) [ 408.894094] IPVS: ftp: loaded support on port[0] = 21 21:03:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 21:03:45 executing program 2: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000090000003903000000000000060e000000000000010000000000000000000080000000000000000000000000000000000000000000000000000000000000000005000000ffffffffffffffff822d000000000000000200000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x60c, 0x3e}) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) fstat(r3, &(0x7f0000000440)) getresuid(0x0, &(0x7f0000001080), &(0x7f00000010c0)) lstat(&(0x7f0000001100)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000380)=0xfffffffffffffcd6) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 409.412845] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:03:46 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00\x04\x00\x00\x00\x00\x00Jk\x00'}) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 21:03:46 executing program 0: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2!\x82\x16\xa1\xc5\b\xf7\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcc\x06\x01\x8dSj\xc6\xfb{\x9cA\xb8\x19x\xc4\x16\x17\xd48\x91\xd8\xd9\xf7V6@{_\xf3\xdc\x8eh\xbdL\xf3\x9b\x83\xb6\xb2I\'\xc6$\x0f4\xaaa\xa1F[\x9e\x98\xa86\x82\x03\x1d\x95W\x8f\xf9C\xa9\x83s\xd0\x13\xbcDI\x06\xf6\x8e\x94\xd0#\x19\xf65Y!\xc1}\x81\xf0>@\xbf\xa3B:\xa8W\x84\xdc&\x87\xcb\xba\x85\xa6\xa3\f&\xa7\x87c{\x13\x9b\x1e\xbd\xe9\xc0J\xb3\xe6\x1d#h\xad\xa9\x8ce$\xca\xf1p^\x97\xf1\x17@\xc1s\a\xe6\x05(\xc4Q\xea\x04:fl\xb1\b\x870:\v\xf1\xaa\xa3\xe9\xb3\x8c\xcb\xbe\x04l\xd2\x85\x13\x87\xe0!d\xda&\a\xffG4bo\x83\xc4~o,\xb5\xc0\xfdk8$_\xf9l\xf0\xfa\x1b\xec\xf7\xdd\xe2\xe3\xc2\xc8\x05Pvu\x92@\\\xc4\x10\xfe0`\x98\xd3\x12\xbe\x05\x9f', 0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 21:03:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00d\x00\xec\xc1\x9f\x15\xba\xcdl\xffOd\x8d\x8dKOb\xcf\b\x81\xf6\xe4\x84Z\xab\xed7e}CK\x8d\xa9>\xe7') getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 21:03:46 executing program 2: r0 = memfd_create(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000090000003903000000000000060e000000000000010000000000000000000080000000000000000000000000000000000000000000000000000000000000000005000000ffffffffffffffff822d000000000000000200000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x60c, 0x3e}) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x7b}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r4, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:03:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:46 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) clock_settime(0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000840)) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$addseals(r0, 0x409, 0x2) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000500)=0x81, 0x4) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000100)={0x290, 0x7, 0x2, 0x20, 0x81, 0x1000}) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000003c0)=""/209) readahead(r1, 0x5, 0x6) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000880)=0x8d) socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000580)={0x0, 0x989680}, &(0x7f00000005c0), 0x6) unshare(0x40000000) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={0xff}, 0x8) creat(&(0x7f00000004c0)='./file0\x00', 0x16) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000600)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='selfGPL!){eth0trusted]keyringuser-vboxnet0\x00', &(0x7f00000001c0)='selfppp0security*\'$eth1/ppp1md5sum\x00', &(0x7f0000000380)='wlan1:cpusetposix_acl_access\x00', &(0x7f0000000540)='\x97!4]-*[\x00'], &(0x7f0000000800)=[&(0x7f0000000640)='\x00', &(0x7f0000000680)='vboxnet0\x00', &(0x7f00000006c0)='#wlan0}}\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='^\x00', &(0x7f0000000780)='%:vmnet1\x00', &(0x7f00000007c0)='\x00'], 0x1000) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000300)=""/107) fcntl$setstatus(r2, 0x4, 0x4000) [ 410.917813] IPVS: ftp: loaded support on port[0] = 21 [ 411.671340] IPVS: ftp: loaded support on port[0] = 21 [ 411.771895] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 413.513161] device bridge_slave_1 left promiscuous mode [ 413.519259] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.572930] device bridge_slave_0 left promiscuous mode [ 413.578736] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.645083] team0 (unregistering): Port device team_slave_1 removed [ 414.656416] team0 (unregistering): Port device team_slave_0 removed [ 414.667079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 414.706409] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 414.771266] bond0 (unregistering): Released all slaves [ 415.545215] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.551866] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.559281] device bridge_slave_0 entered promiscuous mode [ 415.637011] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.643628] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.651898] device bridge_slave_1 entered promiscuous mode [ 415.705464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 415.778151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 415.920387] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 415.972416] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.021439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 416.028423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 416.076588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 416.083557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 416.225120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 416.233172] team0: Port device team_slave_0 added [ 416.280464] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 416.288380] team0: Port device team_slave_1 added [ 416.336516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 416.387201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 416.437182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 416.444586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.453649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.503788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 416.511075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.520270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.023735] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.030243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.037496] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.044022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.052536] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 418.002005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.921086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 419.097614] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 419.271129] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 419.277434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.285374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.461612] 8021q: adding VLAN 0 to HW filter on device team0 21:03:57 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) 21:03:57 executing program 0: r0 = memfd_create(0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000090000003903000000000000060e000000000000010000000000000000000080000000000000000000000000000000000000000000000000000000000000000005000000ffffffffffffffff822d0000000000000002000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) utime(0x0, &(0x7f0000000080)={0x60c, 0x3e}) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000000010, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000780)={0x0, @local, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) fstat(r4, &(0x7f0000000440)) fstat(r1, &(0x7f00000006c0)) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) geteuid() sendmsg$netlink(r3, &(0x7f0000001680)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfe, 0x80010}, 0xc, &(0x7f00000015c0)=[{&(0x7f0000003080)={0x10, 0x3a, 0x305, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x8804}, 0x8000) sendfile(r1, r1, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) fchdir(0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:03:57 executing program 2: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_FIOSETOWN(r0, 0x8901, 0xfffffffffffffffe) lseek(0xffffffffffffffff, 0x0, 0x7) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000040)=0xe8) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000240)={0x46, 0x7d, 0x2, {0x0, 0x3f, 0x0, 0x600b3c57, {0x0, 0x0, 0x4}, 0x1000000, 0x0, 0x0, 0x0, 0x9, 'selinux/{', 0x0, '', 0x3, '{(:'}}, 0x46) 21:03:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x0) 21:03:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'eql\x00', 0x803}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000180)=0x1, 0x2) 21:03:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) [ 421.606168] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 421.845988] print_req_error: 299 callbacks suppressed [ 421.846011] print_req_error: I/O error, dev loop5, sector 0 [ 421.857161] buffer_io_error: 299 callbacks suppressed [ 421.857183] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 421.870228] print_req_error: I/O error, dev loop5, sector 4 [ 421.876051] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 421.883874] print_req_error: I/O error, dev loop5, sector 8 21:03:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfe\xf2\xbduW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7\x05\x04B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd2\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba\xcb\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x0) [ 421.889716] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 421.897561] print_req_error: I/O error, dev loop5, sector 12 [ 421.903978] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 421.911757] print_req_error: I/O error, dev loop5, sector 16 [ 421.917639] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 421.925400] print_req_error: I/O error, dev loop5, sector 20 [ 421.931243] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 421.939122] print_req_error: I/O error, dev loop5, sector 24 [ 421.945075] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 421.952850] print_req_error: I/O error, dev loop5, sector 28 [ 421.958695] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 421.966528] print_req_error: I/O error, dev loop5, sector 32 [ 421.972464] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 421.980216] print_req_error: I/O error, dev loop5, sector 36 [ 421.986156] Buffer I/O error on dev loop5, logical block 9, lost async page write 21:03:58 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) 21:03:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$P9_ROPEN(r2, &(0x7f00000000c0)={0xf56e5cf997b20ded}, 0xff9c) fallocate(r2, 0x0, 0x0, 0x8001) open(0x0, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4bff) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000200), 0xfffffd07}]) 21:03:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) 21:03:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) write$binfmt_aout(r1, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x10000005}}, 0xfdef) 21:03:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x20) 21:03:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, 0xffffffffffffffff, 0x80000) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) listen(r0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffd1e, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 21:03:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:03:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2b0) [ 423.758970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:03:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) [ 423.875588] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:00 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000002c0)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000640)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x3, 0x1, 0x4, 0x5}, 0xc) readv(r0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/168, 0xa8}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r4, 0x1010}, {r4, 0x40}, {r4, 0x1}], 0x3, &(0x7f00000000c0), &(0x7f0000000100)={0xffffffff}, 0xfffffffffffffe73) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000680)=[0x4, 0x4]) r5 = request_key(&(0x7f0000000300)='u3\xbfs\x02', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='/dev/ashmem\x00', 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000540)=[{r2, 0x1000}, {r1, 0x200}, {r3, 0x1120}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x200}, 0x8) r8 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r5, 0x3, r8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x7, 0xc6b}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x0, 0xe54}) 21:04:00 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000180)={0xfffffffffffffffe}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) timer_delete(0x0) 21:04:00 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, &(0x7f0000000000)) 21:04:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) 21:04:00 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, {0x0, 0x6}}}, 0x24}}, 0x0) 21:04:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0x6, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="040400000700000000000000fff5", 0xe, 0x0, 0x0, 0x0) 21:04:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 21:04:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 21:04:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 21:04:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:01 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x10000000004e23}, 0x1c) listen(r0, 0x800000002) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) [ 426.103764] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 426.222821] sctp: failed to load transform for md5: -2 21:04:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/psched\x00') pread64(r0, 0x0, 0x0, 0xffffffffffffffff) 21:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x80000000002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x8000000000000053, 0xffffffffffffffff, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="ea571ee726b1", 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) read(r0, &(0x7f0000000100)=""/42, 0xfffffffffffffd19) 21:04:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="dd", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000140)={0x3, 0x0, [{0xfffffffffffffffb, 0x0, 0x7}, {}, {}]}) 21:04:02 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) read(r0, &(0x7f00000001c0)=""/57, 0x39) 21:04:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 426.548024] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x21, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 21:04:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="dd", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0xfffffece) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') close(r1) syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00\x03aN\x06S\x1c\x13x\xe1\x83\x86\xcaG\xeb\x84!+\xbai\xffbbO5-\x0eF\xbd7\xdc\x1f\xe6\xf4$q \x96cKH`\xca\xf5\x14{dF\xcf\xc4\x8d{\xbft\xb6\x11(\x8b\v\xa0\xbc\x9ak\xbf\xad1\x9d\xc0\xd2\x11W\xf9G\b!\xd4\xcbq\x8d\x9d\xf5\xd3\x12\xe6\x82}U\x8a\t\xd8\xc0\x87s\x02q\xe4\xe07h\xca?\x1d\x00\xe9\xe4\xf3h\x96@i q&\x0e?\x1a>\x9a\xd3\xec\x84=:sK\xe2Qnj\xdc\xb5\x00\xd9\xd5\x9d\xd4\x8d\xd1O\xf68\xees\xd4;d\xa4\xfd\xea-\x8e\xa5\xb4O\xd4\xe9\xfd\xc0 ~\xd92k\xf6\x18\xab:c\xab\xe3\a\xf6\x04?\xc67\xcf\xda4\aN\xcd\r\a\bZ\xf35\x8b\x82\x92\xf7') close(r0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1, 0x0) 21:04:02 executing program 4: socket$netlink(0x10, 0x3, 0x0) 21:04:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000005c0)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) [ 426.956059] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="dd", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000002640)="0a5c2d023c126285718070") socket$packet(0x11, 0xa, 0x300) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) 21:04:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="dd", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) sendto$inet(r0, &(0x7f0000000940)="d3", 0x1, 0x4040000c9, 0x0, 0x0) [ 427.831188] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:04 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 21:04:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, 0x0) syz_open_procfs(0x0, 0x0) 21:04:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') sendfile(r0, r1, 0x0, 0xc6) 21:04:04 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 428.095522] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 428.177647] netlink: 'syz-executor1': attribute type 29 has an invalid length. [ 428.185387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 428.194142] netlink: 'syz-executor1': attribute type 29 has an invalid length. [ 428.201545] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 428.273671] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:04 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) sendto$inet(r0, &(0x7f0000000940)="d3", 0x1, 0x0, 0x0, 0x0) 21:04:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000480)='net/ip6_tables_targets\x00') r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e708007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pwritev(r1, &(0x7f0000000300), 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) socket$inet6_tcp(0xa, 0x1, 0x0) 21:04:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x21, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) write$binfmt_aout(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='\x00'], 0x1) recvmsg(r0, 0x0, 0x100) 21:04:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'vet\x00\xbdh\x00\x00\x00\x00\xe2\xff\xff\xff\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 428.583391] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 428.616612] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 428.629683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 428.638431] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 428.645896] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:04:04 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:04 executing program 0: r0 = eventfd(0x4) read(r0, &(0x7f00000001c0)=""/4096, 0x1000) 21:04:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 428.755622] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 428.763174] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:04:04 executing program 2: symlink(0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 428.913704] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 428.921220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 428.930008] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 428.937592] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:04:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(0x0, 0x0, 0x0) stat(0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x278) r1 = gettid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mknod(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) tkill(r1, 0x1000000000016) [ 428.974878] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 429.020647] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 429.030074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:05 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f0000000140)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffe) dup2(r0, r1) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)) pread64(r1, &(0x7f00000003c0)=""/58, 0x3a, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) geteuid() geteuid() lstat(0x0, 0x0) stat(&(0x7f00000023c0)='./file0\x00', 0x0) getgroups(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getuid() 21:04:05 executing program 0: r0 = eventfd(0x0) gettid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80, 0x80800) write$eventfd(r0, 0x0, 0xffffffbc) 21:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000100), 0x2a2, 0x0) 21:04:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:05 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgrp(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 21:04:05 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x60000200, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 429.547843] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfdef) 21:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:05 executing program 4: perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 429.736763] IPVS: ftp: loaded support on port[0] = 21 21:04:05 executing program 1: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 21:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 429.899035] IPVS: ftp: loaded support on port[0] = 21 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x20001, 0x2, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000000200), 0x0}, 0x18) 21:04:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='+'], 0x1) [ 430.147573] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) write$UHID_INPUT(r2, &(0x7f0000004240)={0x8, "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", 0xfffffffffffffdd1}, 0xfffffe48) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) 21:04:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00i\x9b\v\x01=\x99]a:\x00\x04=Wa5\\\x05\x05sR\xd1V \xd9\xe7\xd1f\xde\xe8\xca\xd9|\x8e\xbf\x03t\x1d\x16X\xbc\x83\x84\xbde\x14\xeeN\xdf(%\\{\x92\xaa~G\xfe\x97\x8cI\\od\x12\x18\xf8\xb5qg\xb5\x85V\xd6L*\x15u\b1z') read(r0, 0x0, 0x0) 21:04:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:04:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:06 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept(r1, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 21:04:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) [ 430.661146] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fcntl$setflags(r0, 0x2, 0x0) 21:04:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:07 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000080)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1400000000000000000000000100000000000000"], 0x14}, 0x0) [ 431.197179] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:07 executing program 0: r0 = creat(&(0x7f00000005c0)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') 21:04:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d800000018008105e00f80ecdb4cb904021965100b007c05e87c55a11200e1730000000000000000000000000000812fa8000500ac141401e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457c0b03c10964c360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703db0de796ac5abeb3a79dd14678", 0xd8}], 0x1}, 0x0) 21:04:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40ca40, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)) r2 = getpid() r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e0000002800812de45ae087aa7a0f60141c185082cf0b00b0eba06eff0f0023420500000000636868b719ec18f3", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000180)={r4}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='/$self@)\x00') [ 431.532397] netlink: 'syz-executor2': attribute type 5 has an invalid length. [ 431.535791] netlink: 26 bytes leftover after parsing attributes in process `syz-executor1'. 21:04:07 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6bea0eab4d4d119f119f91abff030000b68720d5c4cb96f2eee0080921a3cbfe7d5a2bb717c76b0744c40f24e63101000000a1bb387eb825b9b6f07703ff000000000000003ecfc20b00000000000087018610f10b8168026fe69cd4e96a"], 0x1) fcntl$setstatus(r1, 0x4, 0x4bff) io_setup(0x1, &(0x7f00000001c0)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x64) fcntl$setsig(r2, 0xa, 0x2f) setsockopt$inet_opts(r2, 0x0, 0xa, &(0x7f0000000700)="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", 0x10b) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r2, &(0x7f0000a88f88), 0x0, 0x200007fd, 0x0, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendto(r2, &(0x7f0000000040)="b6", 0x1, 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140)=0xda9, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) pipe(&(0x7f0000000080)) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmmsg(r2, &(0x7f0000005680)=[{{&(0x7f0000000c00)=@xdp, 0x80, &(0x7f0000001ec0), 0x0, &(0x7f0000001f40)=""/12, 0xc}}, {{&(0x7f0000001f80)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002000)=""/19, 0x13}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/98, 0x62}, {&(0x7f00000040c0)=""/245, 0xf5}, {&(0x7f00000041c0)=""/189, 0xbd}, {&(0x7f0000004280)=""/18, 0x12}, {&(0x7f00000042c0)=""/9, 0x9}, {&(0x7f0000004300)=""/4096, 0x1000}], 0x9, &(0x7f00000053c0)=""/46, 0x2e}, 0x2}, {{&(0x7f0000005400)=@un=@abs, 0x80, &(0x7f0000005580)=[{&(0x7f0000005480)=""/214, 0xd6}], 0x1, &(0x7f00000055c0)=""/185, 0xb9, 0x4}, 0x20}], 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 431.597908] netlink: 26 bytes leftover after parsing attributes in process `syz-executor1'. 21:04:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d800000018008105e00f80ecdb4cb904021965100b007c05e87c55a11200e1730000000000000000000000000000812fa8000500ac141401e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457c0b03c10964c360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703db0de796ac5abeb3a79dd14678", 0xd8}], 0x1}, 0x0) 21:04:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000600)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000440)) r2 = socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003880)={0x0, 0x989680}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000280)) [ 431.864719] netlink: 'syz-executor2': attribute type 5 has an invalid length. [ 432.001068] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x0, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:08 executing program 4: r0 = creat(&(0x7f0000000380)='./file0\x00', 0x0) r1 = dup3(r0, 0xffffffffffffff9c, 0x100) fsync(r1) 21:04:08 executing program 2: r0 = socket(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e2fe6f1a94a8f30000000000000000000"], 0x1) writev(r1, &(0x7f0000001d00)=[{&(0x7f0000000a00)="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", 0xfc9}], 0x1) 21:04:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x1}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 21:04:08 executing program 4: shmget(0x0, 0x4000, 0x40, &(0x7f0000462000/0x4000)=nil) 21:04:08 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000b40)=@in6={0x2, 0x4e22, 0x0, @mcast1={0xff, 0x5}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x1, 0x2}], 0x10}, 0x0) 21:04:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x80000000) 21:04:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x0, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='\xd8ev \xd9\x16\xd9\xd8\xd1`\xed\x90\xd6\xc6\xd5\x0el\x14\x99cm\xf5\xfdGg\v\xc9z\xd5\x7f\x13\x9eC?\xd6s\x9c-\xdd\xf7\xa5\x98\xa7\anV\xcb\xbf\xa9\xb7\xfc\xcc\xf4\xd3\xf6_(zD\xbe\xa9(JG\x89\xc1\xac\xa9=\xfa\xd6a\x84\x99\xec\x94\xc4A\x14\xf9\xd3\xad|\xeb\b^v\xb4\xa9T\xca\xe9\xde#\xc6\x1c\xce\x9bP\x0f\x91\xa7\xb9\x1f&\x92w\x1b\xa0dn\xbd\xc9&\xa8\x88\xed!\\\xf0\xc06k\x9f\xf7\xa3\x84\xc9\xa4\xa3\x8dr\xc8S}\x00*DT\xe2b\a\xdc\x90\xbd\xbdH&\xf40\xb5awf\x88\xf3\x16\x92\xfdy\xb1\xce\xb8:\x89\xf6-q\a\xeb\x1c[\n\xd7\a\xd4\x8cGM\x96\xee\x92\x18\xbb\a\xa0\x9a\x88\xf8m\xbc\xbc,Th[ \xdb\xb8\xe2\xd4\x99P\b\x90\xa6\xd3\xc0\xd6\xd2ChG\x86i\x84N(\xd5\xf8\x81\'\xb6\xeejN\x84\xdc+\x01\x02\x01\xe6\x8br\x9ebw\xc4\x81\x0f\xa3<\xa6\xa6\xe4\xca\xdc\xa2+E\xa0>\xa9\xdc@\x8b\xed0\xfe\x7f\xde\xd5\x84Qs\x10\xa7o\xa6\n%\xcb\xa4\xbb\xd5\t\x05\x12\xfbPFZt\xf1\x8d`\xeb\xc1\x8f\xea\xb9\xba\xfe\x90\xec@\xce\xf9\x98\xe2\x0f\xa3H\\1\xdaCAi\xaa.~\xeb\xfa4\xb7\xc9x\f\x1eN\x93\xad\xc5K\xe9\xbe\xe8\xd1\xe9\x052\xa9c4\x95\x18,|\xe7y\xdf6\r\x12ul\x10\xef\xe9\xa0\xf8;\x01a-\x8d\t\xf5\xaaN{\xb6\xb8\xe3B\xbd\x92\x00h=rmY\xd4{6\xa8\xbf\xe6x\t\xd2m8\x87[\x96\x9a\x1e@#Ql[W\x98\xaf/v}\xa0p\xa4\x8d\xd6U\xd5-\xf6d93\x7f*\x16\x9dZ\v\xde\x1660Y22\xd1\xf6\xad\x1c\xb9\xfd\x9chm\x9f\xc0\xd1\xe9\xd1\xa02d\xc5\x988o\xc4M\xf8\x14\xcb\xa7\xd3<\n\xad\x9d\xe6', 0x0) ftruncate(r2, 0x3) sendfile(r1, r2, 0x0, 0x4) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/123, 0x5e}], 0x344, &(0x7f0000000680)=""/108, 0x6c}}, {{0x0, 0x0, &(0x7f00000007c0), 0x1}}], 0x6277f28, 0xd2740a8a12457442, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:04:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x0, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:08 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141045, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x10507e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81006) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14, 0x0) sendfile(r1, r3, 0x0, 0x80003) 21:04:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xef, &(0x7f00000002c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x7, 0x7}) [ 432.983037] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:09 executing program 0: close(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x10507e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81006) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14, 0x0) sendfile(r0, r2, 0x0, 0x80003) 21:04:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:09 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x2003, 0x0) close(r0) 21:04:09 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc\x00', 0x200102, 0x0) close(r0) 21:04:09 executing program 4: 21:04:09 executing program 0: 21:04:09 executing program 2: 21:04:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:09 executing program 1: 21:04:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff0a, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x1c}, 0x1c}}, 0x0) 21:04:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff0a, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) read(r0, &(0x7f0000000380)=""/98, 0xfffffffffffffd5e) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) shutdown(r0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 21:04:09 executing program 0: 21:04:09 executing program 1: [ 433.944192] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:10 executing program 4: 21:04:10 executing program 1: 21:04:10 executing program 0: 21:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 21:04:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:10 executing program 2: 21:04:10 executing program 4: 21:04:10 executing program 0: 21:04:10 executing program 1: 21:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 21:04:10 executing program 1: 21:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 21:04:10 executing program 0: 21:04:10 executing program 4: [ 434.890602] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:11 executing program 2: 21:04:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:11 executing program 0: 21:04:11 executing program 4: 21:04:11 executing program 1: 21:04:11 executing program 2: 21:04:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:11 executing program 2: 21:04:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, &(0x7f0000f4d000), 0x0}, 0x18) 21:04:11 executing program 4: [ 435.648347] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:11 executing program 1: 21:04:11 executing program 0: 21:04:12 executing program 4: 21:04:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0), 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, 0x0, 0x0}, 0x18) 21:04:12 executing program 0: 21:04:12 executing program 1: 21:04:12 executing program 2: 21:04:12 executing program 4: 21:04:12 executing program 2: 21:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, 0x0, 0x0}, 0x18) 21:04:12 executing program 0: [ 436.357810] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:12 executing program 1: 21:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x42, 0x400000000007e, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, 0x0, 0x0}, 0x18) 21:04:12 executing program 0: 21:04:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0), 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:12 executing program 4: 21:04:12 executing program 1: 21:04:12 executing program 2: 21:04:12 executing program 0: 21:04:13 executing program 5: 21:04:13 executing program 1: [ 437.079987] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:13 executing program 4: 21:04:13 executing program 0: 21:04:13 executing program 2: 21:04:13 executing program 5: 21:04:13 executing program 1: 21:04:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0), 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:13 executing program 0: 21:04:13 executing program 2: 21:04:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f0000000180)={@void, @val={0x0, 0x84, 0x0, 0x3f}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @link_local, @multicast1, @dev={[], 0x14}, @multicast2}}, 0x2e4) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) 21:04:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') rmdir(&(0x7f0000000180)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\xee\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T2\xb3|O\x85\xc3\xcf\'\xae\xd7%m_\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\xac') 21:04:13 executing program 1: geteuid() getgid() clone(0x1000000000001fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) open(&(0x7f0000000380)='./bus\x00', 0x47f, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r\x05\x00\x00\x00\x00\x00\x00\x00\x01ec_t:s0\x00', 0x22, 0x0) [ 437.738122] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:13 executing program 0: r0 = socket(0x10, 0x2, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '\x18vboxnet1\x00'}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') r2 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000540), &(0x7f0000000240), 0x1000) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) [ 437.836438] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\x00\x00\x04\t\xa5\xf9\xff\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xb0\x06\x15\xfc\xb8\xb5\x16\x86\xbe\x98\xc1\xe5\x9a\x14SS\xd0\x13\xa3\x1aE\x1b?\x1e\xeb6\xf5\xc6\xcd|7B\'\x81\xa7\xf8\xeb\xa0\x9a<\xb2\x14\xe0\x8cy\xfd\x88Ws\x02\xf61o\x1d\x12\xd6\x937\x14\xb6\x04\x1f\n\x00 \x98\xab\x00\xb5\xe5\xd8\xc4\xd1o\x8d\x05\t\x92l\xbc\xb3\xcd\x90T=b\xc9\xb9\xfc\xf8\x18\x9f\xf2\xd1K\x91\x13\xa0\xd7\xdb\xd9\xca\x14\x0eW\x8b:n\xefO{\xed>\xafM\xec\xeaN\xca\x8dF&\x8b=\xe2}\r\xe4\xb0\x7f=\x87\xfcUo\xc2n\x13py\xcc\xd1\x17S\x19R\xe6\x1a~\x87~n\xae\x9d\xd4w\xb3\xe3\x90\xa9\xb0\x88W\x11\xcf\xf2(4\x9d\x91\xf0`B\x97\x84\x0e \x1e\xb74\xbf\x1d\xba\x83K^\xfc\xaaw\x14\x00w_F\x8c\xa1\xd3zr]\x0e\xb3\xff\x9e\xe2\x85k4;puc0\xce\xe96l8rYT\xe1\xc7\'\xd5\xa9\x14Cc\xff\x8d\x90F\x7f\x92a\x000C\xb7\xfb\xd7\xeb\xa6\x8d*I\xb7\x86\xf9\xb0d\x88q\xa5\x16m\xfe\x0f.\xe1\xafX\xf5z\x17\xdea\x82u\x92\x11\x85\xdcn\x9em\xb3S\x10q0\x02\x7fy\x0f\xcf\t\x16\v@*q_\x8atD\xc3\x06\x99\x05\xb10z>r\r\x18\tb\xd5\x19\xc8y\x87A{\xe9\xc2\xfe\xb0u\xfb\xd6F\xb8\xb3w\x1b\x1b\xd0\x16z\xf1\x97\x89\xa0\xa3\a+\xee<\x1a/2\x12\xb0e\xdc\xc2[\x86\xd8\"F&\xa8\xaeAqRJ[\x0f\xbb\xfb\xa4\x14~\xa8\x87\xd8\xc9\xf1\x1e7\xc1\xf5\xcb+\x9a\x05\xb75\x86\xcbN\xc1\x97\xad\xf3\xf8OeQ}\x93\xd1\x81G\xd5\xa5\xe5Zk\x90\x10+\xbf/\x9a\x84BH\xc807\xe6\x06x\x19\xd8&{\xbd7\xd8\xd4\x81\x8c=I\xa4\xa8m\xc3&\xb3\xf9\x9dK\xee\xba%\xd1W\x12\xdd\xf1y[\x8d\x90\xe1\x0eGb\x90/=,\x1d\x01\x0f\xe8:\xec\xca\xf1\x85\xfc\x92-\xfb\xc6\f\xfd\x86\xb8pB\xe3\xe5\xe3tLwibo1G~sU\xfa\x96\x8c\xc2W') fgetxattr(r0, &(0x7f0000000280)=@random={'user.', '\x00'}, &(0x7f0000000400), 0xfffffffffffffe82) 21:04:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) sched_setaffinity(0x0, 0xfffffffffffffd8b, &(0x7f0000000180)=0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100000000, 0x400000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff11, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r4, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r3, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x197) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r5, &(0x7f0000000000), 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) r6 = dup3(r4, r3, 0x200200000080000) ioctl$UI_END_FF_ERASE(r6, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(r6, &(0x7f00000001c0), &(0x7f0000000200)=0x1c) sendto$inet(r5, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0xa1}, 0xc26, 0x9, 0x4}) shutdown(r5, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r7 = gettid() capset(&(0x7f0000000500)={0x20080522, r7}, &(0x7f0000000480)={0x3, 0x5b, 0x3, 0x7, 0x9, 0xffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(r6, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000340)) r8 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r8, &(0x7f0000000580)={0x2, 0x20000, @rand_addr=0x9}, 0x10) 21:04:14 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0xfffffffffffffee7) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\x9e\xd5T\xfa\aBJ\xde\xe9\xcb\xc6\x99\xec,\xa5v\xe5\x00\x00\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xd0\xcfsw\v\xd4$hG\xa1\x91NO\xb0\xaa\x9b\x15\xea\xa9K\xcd\x0ep\x0e\xd6;D3\x8e\x84\xadN\xc2\xf1\x1fo*\xdb\x8d\xc2\xfd\xb1\x821DoC\x14.\xbep\v\"1\xe8\xfc\xee\xd6\xb2*7<\x94\tgZ\xc8\xd0\xb503\x12?\xb3\x03}f$\x1a\xaf\xe0\xf8\x80\xe7\xa5\x1d\x1b\x03j\xde1ZTM%\x81\xfe\x86S\xd0\xcf\xf5Ci\xdf\x8c/\xce!\xdc\xb1\xcb\x96Vi\xf9\xa7SE\xac4y\xcdQ\xdc}\xe3d\xc9\xc2r\xc8>\xd9\xe6f\xca%\xaa\xd2\xe7\xa2n=lb\xd0\xf8\xb9\x06\\\xfc\xa3\x11\xc0m\aD\xdb&Z\xa0\xe4\x86p|Q\xfd\x10\x8c\fl\xca\xe6\xffB\'J\xf9M0\xfc\xe8\x83o\xf9\xd0\v\xdd') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc020660b, 0x730200) 21:04:14 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0xfc1) sendfile(r0, r0, &(0x7f0000000040), 0xff8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000240), &(0x7f0000000500), 0x0) 21:04:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xdb\\', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@bridge_getneigh={0x20, 0x1e, 0x313, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x0) [ 438.523227] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:14 executing program 2: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f0000000280)="76410cc4420a4e8b8e34831db94f6680a20b9e9cc85811cda31128431d1d4f1af4fda4859346f4f24f149503094acd7ccce405661a5861e18c043d6e425bcd2b77c2742449857675e8baa0ac69706fcf289519c3dab4b96ccb0d56ddb8c3c23dc66541fb5be980b6e33cea1c597f4f964cf27eaeda5aa46ebe08a49eea805d58", 0x80, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002040)=""/4096, 0x3d3) 21:04:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{0x0}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000007600000000000000ddffffff20000000000800000000000000000000000000000000000000000000506f4153a6f9"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x0, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, 0x0) [ 438.843145] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:15 executing program 4: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 21:04:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}}, 0x30}}, 0x0) 21:04:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000500)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6gre0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000200)=""/241, 0xf1}], 0x1}, 0x22) 21:04:15 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controlles\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) syz_genetlink_get_family_id$fou(0x0) r4 = accept(r0, 0x0, &(0x7f0000000bc0)) socket(0x5, 0x80000, 0x80) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, 0x0, 0x2e, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000440)) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1000000000000227, 0x0) sendmsg(r4, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x8a) setsockopt$inet6_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000940)="4ec440177a84a5739f649ef8ae72155ac732be", 0x13) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x84, r6, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7d}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xaf}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_1\x00'}) socket$inet6(0xa, 0x400000000000803, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 21:04:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{0x0}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 439.473740] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000500)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6gre0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000200)=""/241, 0xf1}], 0x1}, 0x22) 21:04:15 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x00\x02\x00\xa6$\x1c}m\xfe{JP\xf7m\xeb\xcbR\xdaTDb8\x8cUD\x1d\xa6z\xb2o\x16h%\n\xf5\x8d\xaf\x1a0\'\x8c\xf2\x1b\xedT\x04wAz&Py\xf7\xd1\xeb:e\x0f\x94\x80\xf4') exit(0x0) fstat(r1, &(0x7f0000000600)) 21:04:15 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r6, &(0x7f0000000040), 0x8000fffffffe) 21:04:15 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0xffdb, &(0x7f0000000080)={@link_local, @empty, [{}], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "911aab5cc21f21b9"}}}}, 0x0) 21:04:16 executing program 2: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000fc4ffb)='eth0\x00') mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x4000000000000, 0x0) mq_timedsend(r0, &(0x7f0000307ffd), 0x0, 0x6, 0x0) close(r0) 21:04:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{0x0}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) [ 440.116272] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:16 executing program 2: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000fc4ffb)='eth0\x00') mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x4000000000000, 0x0) mq_timedsend(r0, &(0x7f0000307ffd), 0x0, 0x6, 0x0) close(r0) 21:04:16 executing program 5: clone(0x22102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:04:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:16 executing program 5: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000fc4ffb)='eth0\x00') mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x4000000000000, 0x0) close(r0) 21:04:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 21:04:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000002c0)='stat\x00gJ\x04\x84i\xa2\x18\x03\xf7\xb5\xef\fq\xae-\x7f\x11\xbc\x94\x9e\x03\xd5\xc3\xe4s\x00\xa2\x8c\x92VK&.\xf8\x88o\xb6\x8d\x1e\"d\x90\xf0\xcb\xa8\xad\x15\x9f\xee\xeb\xf1\x9d\t') exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x2007ff) 21:04:16 executing program 0: r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000300)=@abs, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) timerfd_gettime(r1, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) statfs(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/117) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) shutdown(0xffffffffffffffff, 0x0) write$P9_RLINK(r1, 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(r3, 0x5403, 0x0) write$P9_RVERSION(r2, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) 21:04:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1, "b09b6d5c2a91e414699d955ce83b632ad4049739030d61b6f37e405db505735e"}}}}}, 0x0) 21:04:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r6, &(0x7f0000000040), 0x8000fffffffe) 21:04:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x15) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bind$alg(r0, &(0x7f0000000140)={0x26, 'aea\xfe\xff\xff\xff\x00', 0x0, 0x0, 'rfc4309(morus1280)\x00'}, 0x58) 21:04:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") close(r0) 21:04:17 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={0xfffffffffffffffe}, 0x0, 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x4, @tid=r1}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000080)=""/128, 0xae3f1a6) syz_open_procfs(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000140)) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x200000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$lock(r3, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x12) 21:04:17 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) select(0x8150138, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) 21:04:17 executing program 1: 21:04:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:18 executing program 2: 21:04:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000800)="e39fccff051ecbcaa6a2ea", 0xb}], 0x1, 0x0, 0x0, 0x20000040}, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000000, 0x4a, 0x0, &(0x7f0000000440)="b90703e4680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d84648a2ac141411e049eb4be1977d486a72d7363417ef6c9079a2ea9747b34bd1d6e19e6059", 0x0, 0x100}, 0x28) 21:04:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r6, &(0x7f0000000040), 0x8000fffffffe) 21:04:18 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20, 0xfc00}, 0x0) 21:04:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 21:04:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 21:04:18 executing program 1: 21:04:18 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20, 0xfc00}, 0x0) 21:04:18 executing program 1: 21:04:18 executing program 2: 21:04:18 executing program 1: 21:04:19 executing program 2: 21:04:19 executing program 5: 21:04:19 executing program 0: 21:04:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:19 executing program 1: 21:04:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r6, &(0x7f0000000040), 0x8000fffffffe) 21:04:19 executing program 0: 21:04:19 executing program 1: 21:04:19 executing program 5: 21:04:19 executing program 2: 21:04:19 executing program 0: 21:04:19 executing program 1: 21:04:19 executing program 5: 21:04:19 executing program 2: 21:04:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) close(r1) 21:04:20 executing program 1: 21:04:20 executing program 5: 21:04:20 executing program 0: 21:04:20 executing program 2: 21:04:20 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) 21:04:20 executing program 5: 21:04:20 executing program 0: 21:04:20 executing program 1: 21:04:20 executing program 2: 21:04:20 executing program 5: 21:04:20 executing program 2: 21:04:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) close(r1) 21:04:21 executing program 1: 21:04:21 executing program 0: 21:04:21 executing program 5: 21:04:21 executing program 2: 21:04:21 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 21:04:21 executing program 1: 21:04:21 executing program 0: 21:04:21 executing program 5: 21:04:21 executing program 2: 21:04:21 executing program 0: 21:04:21 executing program 1: 21:04:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) close(r1) 21:04:22 executing program 0: 21:04:22 executing program 2: 21:04:22 executing program 5: 21:04:22 executing program 1: 21:04:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x2000800) 21:04:22 executing program 2: 21:04:22 executing program 5: 21:04:22 executing program 1: 21:04:22 executing program 0: 21:04:22 executing program 1: 21:04:22 executing program 5: 21:04:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r1) 21:04:23 executing program 2: 21:04:23 executing program 0: 21:04:23 executing program 1: 21:04:23 executing program 5: 21:04:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:23 executing program 1: 21:04:23 executing program 2: 21:04:23 executing program 5: 21:04:23 executing program 0: 21:04:23 executing program 1: 21:04:23 executing program 5: 21:04:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r1) 21:04:24 executing program 2: 21:04:24 executing program 0: 21:04:24 executing program 1: 21:04:24 executing program 5: 21:04:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) getpid() ioprio_get$uid(0x2, 0x0) 21:04:24 executing program 0: 21:04:24 executing program 2: 21:04:24 executing program 1: 21:04:24 executing program 5: 21:04:24 executing program 1: 21:04:24 executing program 0: 21:04:25 executing program 5: 21:04:25 executing program 2: 21:04:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r1) 21:04:25 executing program 1: 21:04:25 executing program 0: 21:04:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) getpid() ioprio_get$uid(0x2, 0x0) 21:04:25 executing program 0: 21:04:25 executing program 2: 21:04:25 executing program 1: 21:04:25 executing program 5: 21:04:25 executing program 2: 21:04:25 executing program 5: 21:04:25 executing program 0: 21:04:25 executing program 1: 21:04:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) close(r1) 21:04:26 executing program 2: 21:04:26 executing program 5: 21:04:26 executing program 1: 21:04:26 executing program 0: 21:04:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) getpid() ioprio_get$uid(0x2, 0x0) 21:04:26 executing program 0: 21:04:26 executing program 2: 21:04:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$tun(r1, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x64) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) open$dir(0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmmsg(r2, &(0x7f0000005680)=[{{&(0x7f0000000c00)=@xdp, 0x80, &(0x7f0000001ec0), 0x0, &(0x7f0000001f40)=""/12, 0xc}}, {{&(0x7f0000001f80)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002000)=""/19, 0x13}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/98, 0x62}, {&(0x7f00000040c0)=""/245, 0xf5}, {&(0x7f00000041c0)=""/189, 0xbd}, {&(0x7f0000004280)=""/18, 0x12}, {&(0x7f00000042c0)=""/9, 0x9}, {&(0x7f0000004300)=""/4096, 0x1000}], 0x9, &(0x7f00000053c0)=""/46, 0x2e}, 0x2}, {{&(0x7f0000005400)=@un=@abs, 0x80, &(0x7f0000005580)=[{&(0x7f0000005480)=""/214, 0xd6}], 0x1, &(0x7f00000055c0)=""/185, 0xb9, 0x4}, 0x20}], 0x3, 0x0, 0x0) 21:04:26 executing program 5: 21:04:26 executing program 2: 21:04:26 executing program 0: 21:04:27 executing program 2: 21:04:27 executing program 5: 21:04:27 executing program 0: 21:04:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) close(r1) 21:04:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:27 executing program 5: 21:04:27 executing program 0: 21:04:27 executing program 2: 21:04:27 executing program 1: 21:04:27 executing program 0: 21:04:27 executing program 5: 21:04:27 executing program 1: 21:04:27 executing program 2: 21:04:27 executing program 0: 21:04:27 executing program 2: 21:04:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) close(r1) 21:04:28 executing program 5: 21:04:28 executing program 1: 21:04:28 executing program 0: 21:04:28 executing program 2: 21:04:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:28 executing program 5: 21:04:28 executing program 2: 21:04:28 executing program 0: 21:04:28 executing program 5: 21:04:28 executing program 1: 21:04:28 executing program 2: 21:04:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:28 executing program 5: 21:04:28 executing program 0: 21:04:28 executing program 1: 21:04:28 executing program 2: 21:04:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000600)) ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:29 executing program 1: 21:04:29 executing program 2: 21:04:29 executing program 5: 21:04:29 executing program 0: 21:04:29 executing program 1: 21:04:29 executing program 0: 21:04:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:29 executing program 5: 21:04:29 executing program 1: 21:04:29 executing program 2: 21:04:29 executing program 0: 21:04:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) sendfile(r4, r4, &(0x7f0000000380), 0x6cfce4cf) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:30 executing program 1: 21:04:30 executing program 2: 21:04:30 executing program 0: 21:04:30 executing program 5: 21:04:30 executing program 2: 21:04:30 executing program 5: 21:04:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:30 executing program 1: 21:04:30 executing program 0: 21:04:30 executing program 2: 21:04:30 executing program 5: 21:04:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) write(r4, &(0x7f0000000040)="16", 0x1) r5 = getpid() ioprio_set$pid(0x1, r5, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:31 executing program 1: 21:04:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") memfd_create(&(0x7f0000000000)='securit}\x91v\x17\xcb\x0e=\xbeEteo\x00', 0x0) r4 = getpid() ioprio_set$pid(0x1, r4, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:31 executing program 0: 21:04:31 executing program 5: 21:04:31 executing program 2: 21:04:31 executing program 1: 21:04:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = getpid() ioprio_set$pid(0x1, r4, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:31 executing program 0: 21:04:31 executing program 1: 21:04:31 executing program 5: 21:04:31 executing program 2: 21:04:32 executing program 2: 21:04:32 executing program 5: 21:04:32 executing program 1: 21:04:32 executing program 0: [ 455.993839] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = getpid() ioprio_set$pid(0x1, r3, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:32 executing program 2: 21:04:32 executing program 5: 21:04:32 executing program 1: 21:04:32 executing program 0: 21:04:32 executing program 2: 21:04:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x2) fcntl$setstatus(r2, 0x4, 0x0) r3 = getpid() ioprio_set$pid(0x1, r3, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:32 executing program 2: 21:04:32 executing program 0: 21:04:33 executing program 1: 21:04:33 executing program 5: 21:04:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) creat(&(0x7f0000000700)='./bus\x00', 0x2) r2 = getpid() ioprio_set$pid(0x1, r2, 0x7fff) ioprio_get$uid(0x2, 0x0) [ 457.011265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:33 executing program 1: 21:04:33 executing program 0: 21:04:33 executing program 2: 21:04:33 executing program 5: 21:04:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/67) r2 = getpid() ioprio_set$pid(0x1, r2, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r1) 21:04:33 executing program 1: 21:04:33 executing program 5: 21:04:33 executing program 0: 21:04:33 executing program 2: 21:04:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) fchdir(r1) r2 = getpid() ioprio_set$pid(0x1, r2, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) r1 = getpid() ioprio_set$pid(0x1, r1, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:34 executing program 5: 21:04:34 executing program 0: 21:04:34 executing program 2: 21:04:34 executing program 1: [ 458.040444] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:34 executing program 0: 21:04:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) close(r1) 21:04:34 executing program 2: 21:04:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = getpid() ioprio_set$pid(0x1, r1, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:34 executing program 5: 21:04:34 executing program 1: 21:04:34 executing program 0: 21:04:34 executing program 5: 21:04:34 executing program 2: 21:04:35 executing program 0: 21:04:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) r1 = getpid() ioprio_set$pid(0x1, r1, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:35 executing program 1: 21:04:35 executing program 5: 21:04:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) close(r1) 21:04:35 executing program 2: 21:04:35 executing program 0: 21:04:35 executing program 1: 21:04:35 executing program 5: 21:04:35 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x4000, 0x0) r0 = getpid() ioprio_set$pid(0x1, r0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:35 executing program 1: 21:04:35 executing program 0: 21:04:35 executing program 4: r0 = getpid() ioprio_set$pid(0x1, r0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:36 executing program 5: 21:04:36 executing program 2: 21:04:36 executing program 1: 21:04:36 executing program 0: 21:04:36 executing program 4: r0 = getpid() ioprio_set$pid(0x0, r0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) close(r1) 21:04:36 executing program 1: 21:04:36 executing program 5: 21:04:36 executing program 2: 21:04:36 executing program 4: r0 = getpid() ioprio_set$pid(0x0, r0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:36 executing program 1: 21:04:36 executing program 5: 21:04:36 executing program 2: 21:04:36 executing program 0: 21:04:37 executing program 4: r0 = getpid() ioprio_set$pid(0x0, r0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:37 executing program 1: 21:04:37 executing program 5: 21:04:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:04:37 executing program 2: 21:04:37 executing program 0: 21:04:37 executing program 5: 21:04:37 executing program 4: getpid() ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:37 executing program 1: 21:04:37 executing program 1: 21:04:37 executing program 5: 21:04:37 executing program 2: 21:04:37 executing program 4: getpid() ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:37 executing program 0: [ 461.835142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:38 executing program 4: getpid() ioprio_set$pid(0x1, 0x0, 0x7fff) ioprio_get$uid(0x2, 0x0) 21:04:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:04:38 executing program 5: 21:04:38 executing program 2: 21:04:38 executing program 1: 21:04:38 executing program 0: 21:04:38 executing program 4: r0 = getpid() ioprio_set$pid(0x1, r0, 0x0) ioprio_get$uid(0x2, 0x0) 21:04:38 executing program 0: 21:04:38 executing program 5: 21:04:38 executing program 4: r0 = getpid() ioprio_set$pid(0x1, r0, 0x0) ioprio_get$uid(0x0, 0x0) 21:04:38 executing program 2: [ 462.512469] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:38 executing program 1: 21:04:38 executing program 5: 21:04:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x4102}) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0x2}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(0xffffffffffffffff) 21:04:39 executing program 0: 21:04:39 executing program 2: 21:04:39 executing program 4: 21:04:39 executing program 1: 21:04:39 executing program 5: 21:04:39 executing program 5: 21:04:39 executing program 2: 21:04:39 executing program 4: [ 463.240948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:04:39 executing program 0: 21:04:39 executing program 1: 21:04:39 executing program 4: 21:04:39 executing program 1: 21:04:39 executing program 5: 21:04:39 executing program 2: 21:04:39 executing program 0: 21:04:39 executing program 4: 21:04:39 executing program 3: 21:04:39 executing program 5: 21:04:39 executing program 2: 21:04:39 executing program 1: 21:04:39 executing program 4: 21:04:40 executing program 0: 21:04:40 executing program 3: 21:04:40 executing program 5: 21:04:40 executing program 2: 21:04:40 executing program 1: 21:04:40 executing program 4: 21:04:40 executing program 0: 21:04:40 executing program 2: 21:04:40 executing program 3: 21:04:40 executing program 5: 21:04:40 executing program 1: 21:04:40 executing program 4: 21:04:40 executing program 0: 21:04:40 executing program 2: 21:04:40 executing program 5: 21:04:40 executing program 3: 21:04:40 executing program 4: 21:04:40 executing program 1: 21:04:40 executing program 2: 21:04:40 executing program 0: 21:04:41 executing program 5: 21:04:41 executing program 3: 21:04:41 executing program 4: 21:04:41 executing program 2: 21:04:41 executing program 1: 21:04:41 executing program 5: 21:04:41 executing program 0: 21:04:41 executing program 3: 21:04:41 executing program 4: 21:04:41 executing program 1: 21:04:41 executing program 2: 21:04:41 executing program 3: 21:04:41 executing program 0: 21:04:41 executing program 5: 21:04:41 executing program 1: 21:04:41 executing program 4: 21:04:41 executing program 2: 21:04:41 executing program 5: 21:04:41 executing program 0: 21:04:41 executing program 3: 21:04:42 executing program 2: 21:04:42 executing program 4: 21:04:42 executing program 1: 21:04:42 executing program 0: 21:04:42 executing program 2: 21:04:42 executing program 5: 21:04:42 executing program 3: 21:04:42 executing program 4: 21:04:42 executing program 2: 21:04:42 executing program 1: 21:04:42 executing program 5: 21:04:42 executing program 0: 21:04:42 executing program 3: 21:04:42 executing program 2: 21:04:42 executing program 0: 21:04:42 executing program 1: 21:04:42 executing program 4: 21:04:42 executing program 5: 21:04:42 executing program 3: 21:04:43 executing program 2: 21:04:43 executing program 1: 21:04:43 executing program 0: 21:04:43 executing program 4: 21:04:43 executing program 3: 21:04:43 executing program 5: 21:04:43 executing program 2: 21:04:43 executing program 1: 21:04:43 executing program 3: 21:04:43 executing program 4: 21:04:43 executing program 0: 21:04:43 executing program 3: 21:04:43 executing program 1: 21:04:43 executing program 2: 21:04:43 executing program 4: 21:04:43 executing program 5: 21:04:43 executing program 0: 21:04:43 executing program 3: 21:04:43 executing program 0: 21:04:43 executing program 2: 21:04:44 executing program 5: 21:04:44 executing program 1: 21:04:44 executing program 4: 21:04:44 executing program 0: 21:04:44 executing program 2: 21:04:44 executing program 3: 21:04:44 executing program 5: 21:04:44 executing program 4: 21:04:44 executing program 1: 21:04:44 executing program 0: 21:04:44 executing program 2: 21:04:44 executing program 3: 21:04:44 executing program 4: 21:04:44 executing program 5: 21:04:44 executing program 0: 21:04:44 executing program 1: 21:04:44 executing program 3: 21:04:44 executing program 4: 21:04:44 executing program 2: 21:04:45 executing program 0: 21:04:45 executing program 5: 21:04:45 executing program 4: 21:04:45 executing program 1: 21:04:45 executing program 3: 21:04:45 executing program 2: 21:04:45 executing program 0: 21:04:45 executing program 4: 21:04:45 executing program 5: 21:04:45 executing program 3: 21:04:45 executing program 1: 21:04:45 executing program 2: 21:04:45 executing program 4: 21:04:45 executing program 3: 21:04:45 executing program 0: 21:04:45 executing program 5: 21:04:45 executing program 4: 21:04:45 executing program 1: 21:04:45 executing program 3: 21:04:45 executing program 2: 21:04:46 executing program 0: 21:04:46 executing program 4: 21:04:46 executing program 5: 21:04:46 executing program 3: 21:04:46 executing program 1: 21:04:46 executing program 2: 21:04:46 executing program 4: 21:04:46 executing program 0: 21:04:46 executing program 3: 21:04:46 executing program 5: 21:04:46 executing program 1: 21:04:46 executing program 4: 21:04:46 executing program 2: 21:04:46 executing program 3: 21:04:46 executing program 0: 21:04:46 executing program 1: 21:04:46 executing program 5: 21:04:46 executing program 4: 21:04:46 executing program 0: 21:04:46 executing program 3: 21:04:47 executing program 2: 21:04:47 executing program 1: 21:04:47 executing program 5: 21:04:47 executing program 0: 21:04:47 executing program 3: 21:04:47 executing program 4: 21:04:47 executing program 1: 21:04:47 executing program 3: 21:04:47 executing program 0: 21:04:47 executing program 5: 21:04:47 executing program 2: 21:04:47 executing program 1: 21:04:47 executing program 3: 21:04:47 executing program 4: 21:04:47 executing program 1: 21:04:47 executing program 5: 21:04:47 executing program 3: 21:04:47 executing program 0: 21:04:47 executing program 4: 21:04:47 executing program 2: 21:04:48 executing program 1: 21:04:48 executing program 5: 21:04:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00\xd4>\xd7\xeb\xf2gh\xda\xdax9\xe3\x88~@\xe1&\x8f\x12^\xbe]W#^\xa4\x958\xc9\xd1t\x05\xbcM\x02\xc3m(\xf1IP\x9c\v;\xa6\xfe{\x042\xab\x10\xcb\xa4\xfc\x8f\xac\xe2\xd3\xb7\xb0+\xb2\xa5\x84\x97\xe0?\xf6\rU_m\x8a\xf1\xb4\xd8\xe4\x18\xb5\x8c\x0eWZ\xbdH3IU\xa2\x80\xcd?\x00\x0e\xe5\xde\x05\x11\a\x8dX\xed$\xe6\xe2\x03\x94\xb2&\xcd\xf4*2\x10\xa7Bs\x17\xa5\xc6\xe9\xd4elTI\xff\xda\xa7\x86\xd6n}\x95\xba\xb6\x0e\xca\x85\xc9\xe5\xd5Em\xeeZ\x85\xf4\x86\xb5\x81\x7f\xf4x\r\xf3\xfd4\x04\xbe\xb4\x88c\x87\x84\xd7\xdf\x7f\x04\t\xe3e\x7ff\x7f\n\xa9\xae\x12f\x01') renameat2(r0, &(0x7f0000000200)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) 21:04:48 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x2}) 21:04:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000007e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=[{0x10, 0x1}], 0x10}}], 0x1, 0xc4) 21:04:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000001680)=@nfc, 0x80, 0x0, 0x0, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYRESHEX]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009940)={{{@in, @in=@loopback}}, {{@in=@loopback}}}, &(0x7f0000009900)=0xaea1a78502d95c47) lstat(&(0x7f0000002d80)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() clone(0x2e828903, &(0x7f0000000080), 0x0, &(0x7f0000000140), &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(r0, 0x0, 0x0, &(0x7f0000000280)) 21:04:48 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000080)={0x2}, 0x8) 21:04:48 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) close(r0) 21:04:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffd46) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x1f00, 0x0) 21:04:48 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000001480), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)="035db86376863a68fe800000000000004208c349d7c40346d59be1310600d92c2ae7e012e28b857c", 0x28}], 0x1}, 0x0) 21:04:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) close(r0) 21:04:48 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x8}, 0x80, 0x0}, 0x20004040) close(r0) 21:04:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 21:04:48 executing program 3: mkdir(&(0x7f00000013c0)='./file0/\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/\x00', &(0x7f0000000240)='proc\x00\x9bj,\x82?\x92\xab\x1d[/P\x15\\!\xb4\xdd\xad\xd9\x06\x00y!k\xec\xc1oG\xaf\xb3\xae\xc6\xb4\xd7W\xea\xc0\xa64J\xfd\x1c\xe9\xd5a\a\\1\xc4\x14*\xa5\xbfa\xc3\xaeE\x86@\xc0\xeca\xba\xa4\xc0\rhL\xd9^\v\xe6\x81S\xc4\xad\xca^E\x19\f:&\xa5\fA\xd7\x93\xa4\xa9\x83\xe9', 0x0, 0x0) stat(&(0x7f0000000200)='./file0/\x00', &(0x7f00000003c0)) 21:04:48 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') getdents(r0, 0x0, 0x0) 21:04:48 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/exec\x00', 0x2, 0x0) 21:04:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'nr\x00\x80\x00\x1a\x10\x00\xfe\x01\x00', 0x1}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'sit0\x00'}) 21:04:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@un=@abs={0x1}, 0x4b, &(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) 21:04:49 executing program 4: pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001b00)) 21:04:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 21:04:49 executing program 2: clock_gettime(0x6, &(0x7f0000000080)) 21:04:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)) ioctl$TIOCSBRK(r1, 0x40044590) 21:04:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/unix\x00') preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/181, 0xb5}], 0x2, 0x0) 21:04:49 executing program 3: mkdir(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB=',group_id=']) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) sched_getscheduler(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket(0x840000000002, 0x3, 0xff) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000340)) open$dir(&(0x7f0000000400)='./file0\x00', 0x14000, 0x43897502b9c81bdf) 21:04:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') 21:04:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@mcast1, @local}) 21:04:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'nr\x00\x80\x00\x1a\x10\x00\xfe\x01\x00', 0x1}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 21:04:49 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000600)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0xff80000000000002}) 21:04:49 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 21:04:49 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000600)='/dev/snd/timer\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, 0x0, &(0x7f0000000280)={0x1}, 0x8) 21:04:49 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000600)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000440)) 21:04:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r1) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) [ 473.913118] binder: 15528:15532 transaction failed 29189/-22, size 0-0 line 2834 21:04:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000140)}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x2, 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) 21:04:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x5, 0x4) 21:04:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) dup(r0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000001540)=""/4096) 21:04:50 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000880)) timer_gettime(0x0, 0x0) [ 474.180330] binder: undelivered TRANSACTION_ERROR: 29189 21:04:50 executing program 1: timer_create(0x3, 0x0, &(0x7f00000012c0)) timer_gettime(0x0, 0x0) 21:04:50 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0}}], 0x0, 0x0, 0x0}) 21:04:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="1800000000000000010000000100009743d6abad21bb7df7"], 0x18}}], 0x1, 0x0) 21:04:50 executing program 1: r0 = socket(0x2, 0xc003, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="83022e2fe669ca843e"], 0x1) writev(r0, &(0x7f00000012c0)=[{0x0}], 0x1) [ 474.550775] binder: 15559:15560 transaction failed 29189/-22, size 0-0 line 2834 21:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x40000a) write$cgroup_type(r0, &(0x7f0000000440)='threaded\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="10b0e912960e47f4d338eaa3a1c505a31f3c91f9754e32e1cf37000145eba8"], 0x1f) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0xfffffd1e) [ 474.695122] binder: undelivered TRANSACTION_ERROR: 29189 21:04:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) 21:04:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x40000a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="10b0e912960e47f4d338eaa3a1c5"], 0xe) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0xfffffd1e) 21:04:51 executing program 0: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x29e) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 21:04:51 executing program 5: getpgid(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000480)=ANY=[@ANYBLOB="7304000000000000c2040000000107100000000702eb01000100000000000000050203000502080f050200b300000000"], 0x1) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:04:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip_vti0\x00', 0x8000}) 21:04:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(r3, &(0x7f0000000080)="4fe6ac2887f4179fddb7f9464b83cb452df7cb9ffb9dbe", 0x17) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8000fffffffe) 21:04:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0xfffffffffffffec1, 0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x709000) 21:04:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 21:04:51 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) symlink(0x0, 0x0) r2 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000480)) epoll_wait(r2, &(0x7f0000000140)=[{}], 0x1, 0xff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:04:51 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 21:04:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040), 0x10) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xffffffffffffff41) recvfrom$unix(r2, 0x0, 0x0, 0x3f00, &(0x7f0000000100)=@abs, 0x6e) r3 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) write(r3, &(0x7f0000000000)="641c508c0eed24018a921b24aba9e5afa50bc61d177e", 0x16) sendfile(r3, r3, &(0x7f0000001000), 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x4048000}, 0x8014) fcntl$getown(0xffffffffffffffff, 0x9) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000000c0), 0xc}, 0x0) add_key(&(0x7f0000001800)='syzkaller\x00', &(0x7f0000001900)={'syz'}, 0x0, 0x0, 0x0) 21:04:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}}) 21:04:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000080)) 21:04:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)) 21:04:52 executing program 2: 21:04:52 executing program 0: 21:04:52 executing program 3: 21:04:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffaf, 0x20000003, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) 21:04:52 executing program 5: 21:04:52 executing program 4: 21:04:52 executing program 4: 21:04:52 executing program 5: 21:04:52 executing program 2: 21:04:52 executing program 3: 21:04:52 executing program 4: 21:04:53 executing program 1: 21:04:53 executing program 0: 21:04:53 executing program 2: 21:04:53 executing program 4: 21:04:53 executing program 3: 21:04:53 executing program 1: 21:04:53 executing program 0: 21:04:53 executing program 5: 21:04:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) read(r0, 0x0, 0x3b8) 21:04:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000040)='%d') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x9}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000240), 0x0}, 0x20) socketpair(0xa, 0x5, 0x5, &(0x7f00000000c0)) 21:04:53 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004d80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000004e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x400200007fe, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) [ 477.434359] input: syz1 as /devices/virtual/input/input18 21:04:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 21:04:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:04:53 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000007, 0x11, r0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:04:53 executing program 1: 21:04:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) 21:04:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pwrite64(r0, 0x0, 0x0, 0x0) 21:04:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='keyringlo\x00\xf9\xe32\x10\xd4w\xf0\xfb\xca\x82\xbf\xc2K\x1c\x95\xaaPv\xben\x8b\xd7\xaf\fn\xdd\xf0\x18\'\"\xfe\xff+\x9a\x00\xce\xf0\xfbi\x84\xe5``\xde\xb0\x90\x81]\x9e\xf9\xfb\xc9\xfe\xbc\xd2e}\x98\x06_c\x0f\x14\xbc\xe0\xd3.,\x81\xa5\xbf4\xf6\x03D\xd5\xd1tU\xfd\x1b\x7f&`+t\xc3F<\x13\xbf\xbd\xc2c\xe8\xe6\xc0\xe4\xfd\xb0\xb3S\xd9n\x05\xf4\xaf\xda\xa5\xe9\xa21\x1e\v\x047\xb3\xd7yO\xd3>\xcc\x81\x1fm\xb8\x06\xdaT\xef+:\xc6l\xdbA\xbd\xb6B-8\x9e\xf5;\x01l\xb1\'\xcb\xae|ggX\xe1\x99u$\xeaoW\xfe\x8e1X\xa0\xb8\x939\xf5Mm\x86\xb3\xf1\xd5\xebN\x93.J\"\xb6\xda\r\x1d>\xaf\xf99\xd91 \x19\xfc\x98\x82\xc3{d\xcc?\xf3\xe0\x01(\x1cv#\xc8\x91\x16\xa7\xdd\x8a\xefj!\x10\xb5\xc8\"q}\x7f\x9d\x03\x01a(\xean\x95\xa6ok\xb4\x17X;\xf0\xddT\xd1\xcd\x01[0\xf2\x96\xd8\xf6\xe5\xeeC\x8b&|\xf4\x03\x9a\x90_j\x83\t\x92v\x96\xe6\xdc\xfb\xa6\x1b\x16\x10u\x85\xa2\xa1\x88\xba\x10\xeaWk\xd6\x99\xbc\x90x\xd3\xed\xec\xcf\xbd\xbf\xc5_C\xdd\x899\x9e\xd3XD\xe7{\xf9[\xa7\x9f\x17\xbb\x93\xbf\x85\xe1l\xf6*\x13\xb5,%\xc2R\xb7\xe4QO\x01\x1c\x9d\xa6\xb2\xcb\x7f\x19\b\xfeX\xceer\x16\xb2\xa5\x19\x0e\nrp\x99\xab\r\x83\xcc\xdd\xdb\xaag\x92\xf2\xbe\xbf\x9a\x8bqk=\xd8\x8d\x15\x90\xc1\xd4\xfc\xc1\xe8\x18\xdc\x822F\xd6\xd5\x9eD\x9f\xcf\xf4\x97\x0f\xf8\x88\xefc\xc1\'}v\xc8Y\xf6\xeb\xa0\x8c\x01=+\xba\ry\x18t\x03\xbf\xe4]\"\xa2\xb8\xdc\xb5\xffg\x9et\x81V\xc5{2e%os\x97\xf6\xc1\x8c\x91\"\xdb[\xdf\xb6pv\xee\x1a\x04\xdc\xcf\xd3&\x99\xaa\xd4q\x99\xbd\xe5\x05', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/88) 21:04:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x414}, 0x7) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x9) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8100fffffffe) creat(&(0x7f0000000200)='./bus\x00', 0x0) 21:04:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000000)=""/122) [ 478.225315] input: syz1 as /devices/virtual/input/input19 21:04:54 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 21:04:54 executing program 4: r0 = msgget(0x2, 0x0) getgroups(0x7, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setgroups(0x0, 0x0) setregid(0x0, r1) setuid(0xee01) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 21:04:54 executing program 2: creat(&(0x7f0000000680)='./file0\x00', 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:04:54 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) keyctl$chown(0x4, r1, 0x0, r2) 21:04:54 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='\a\x8c\xc9\xd7\xf0\b\xfa', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfffd) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000007, 0x11, r0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd9}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 21:04:54 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 21:04:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="310900000000000000000900000018000400140005000000000000006173746c696e6b0000"], 0x1}}, 0x0) 21:04:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) [ 478.816824] ptrace attach of "/root/syz-executor1"[15761] was attempted by "/root/syz-executor1"[15762] 21:04:54 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x8000000002, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000100)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf6\xff\xff\xff\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "80"}, 0x119) socket$inet(0x2, 0x0, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000240), 0x6) 21:04:54 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 478.877783] input: syz1 as /devices/virtual/input/input20 21:04:55 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x1, 0x130, [0x20000380, 0x0, 0x0, 0x200003b0, 0x20000480], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x100000000021, 0x0, 'irlan0\x00', 'lo\x00\x00\xe5\xff\xe0\xff\xe9\xff\xff\xff\x00', 'veth0\x00', 'irla\x00\x00\a\x00', @random="2292aeead762", [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r1, &(0x7f0000000000), 0x400000000000036, 0x0) 21:04:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x100000000014, 0x4, 0x4, 0x39e1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000080)="b7b9", 0x0}, 0x18) [ 478.984600] input: syz1 as /devices/virtual/input/input21 [ 479.113406] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 21:04:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002640)={r0, &(0x7f0000002500)="7f", 0x0, 0x2}, 0x20) 21:04:55 executing program 4: mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 479.355480] hid-generic 0000:0000:0000.0002: hidraw1: HID v0.00 Device [syz1] on syz1 [ 479.440393] print_req_error: 249 callbacks suppressed [ 479.440415] print_req_error: I/O error, dev loop5, sector 0 [ 479.451731] buffer_io_error: 249 callbacks suppressed [ 479.451752] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 479.464749] print_req_error: I/O error, dev loop5, sector 4 [ 479.470518] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 479.478306] print_req_error: I/O error, dev loop5, sector 8 [ 479.484114] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 479.491979] print_req_error: I/O error, dev loop5, sector 12 [ 479.497882] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 479.505751] print_req_error: I/O error, dev loop5, sector 16 [ 479.511602] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 479.519380] print_req_error: I/O error, dev loop5, sector 20 [ 479.525292] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 479.533102] print_req_error: I/O error, dev loop5, sector 24 [ 479.538943] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 479.546838] print_req_error: I/O error, dev loop5, sector 28 [ 479.552743] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 479.560467] print_req_error: I/O error, dev loop5, sector 32 [ 479.566408] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 479.574213] print_req_error: I/O error, dev loop5, sector 36 [ 479.580059] Buffer I/O error on dev loop5, logical block 9, lost async page write 21:04:56 executing program 2: r0 = memfd_create(&(0x7f0000000200)='p\"\x18\a\x97\x81\x8d\xeb}\x13^\xc7\n\xfcv\x80\n\xb2}\xab\xdb\t\xbchT\xf02\xa1L\xe6\xdaZ\xc1p\xba0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 21:04:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x800000000004, 0x4, 0x9}, 0x2c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000400), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, &(0x7f0000000240)}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f00000005c0)=""/8, 0x8}, {&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000680)=""/27, 0x1b}, {&(0x7f00000006c0)=""/129, 0x81}, {&(0x7f0000000780)=""/231, 0xe7}, {&(0x7f00000018c0)=""/62, 0x3e}, {&(0x7f0000001900)=""/201, 0xc9}], 0x8, &(0x7f0000001a80)=""/220, 0xdc}, 0x40002000) 21:04:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000100)=0x9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000040)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 21:04:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={'%at\x00', 0x19, 0x2, 0x1d8, [0x20000140, 0x0, 0x0, 0x20000258, 0x20000288], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'rose0\x00', ' \x00\x00\xfa\x00\x00\x00\x13\x00', 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x250) 21:04:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) shutdown(r0, 0x0) [ 480.314242] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 480.351328] kernel msg: ebtables bug: please report to author: Valid hook without chain 21:04:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={'%at\x00', 0x19, 0x2, 0x1d8, [0x20000140, 0x0, 0x0, 0x20000258, 0x20000288], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'rose0\x00', ' \x00\x00\xfa\x00\x00\x00\x13\x00', 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x250) 21:04:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:04:56 executing program 3: mkdir(0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="040000000000000010000200000000002000000000000000"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x31c, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r2, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = accept$unix(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000640)) syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x200000) getsockopt$IP_VS_SO_GET_VERSION(r6, 0x0, 0x480, &(0x7f00000002c0), 0x0) 21:04:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000520007031dfffd946fa283000a200a007ebe24ad09000300001d85680c1ba3a2", 0x24}], 0x1}, 0x0) 21:04:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:04:56 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = semget$private(0x0, 0x7, 0x20) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000080)=""/10) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x41) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000c00)) prctl$PR_SET_DUMPABLE(0x4, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) write$P9_RLOCK(r1, &(0x7f0000000c80)={0x8, 0x35, 0x0, 0x2}, 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000e40)={0xe, 0x7, 0x0, {0x5, '+-%+-'}}, 0xe) link(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)='./file0\x00') write$P9_RFSYNC(r0, &(0x7f0000001040)={0x7, 0x33, 0x1}, 0x7) [ 480.596126] kernel msg: ebtables bug: please report to author: Valid hook without chain 21:04:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={'%at\x00', 0x19, 0x2, 0x1d8, [0x20000140, 0x0, 0x0, 0x20000258, 0x20000288], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'rose0\x00', ' \x00\x00\xfa\x00\x00\x00\x13\x00', 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x250) 21:04:56 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) socket$netlink(0x10, 0x3, 0x4) 21:04:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000180)="1bdf210eca865b4fe629f6a7bb5ae85a267107ab3203c8bec5e4746e7c95d8becb29bd1a1b488888f38b25bfabb8eb5479ba7291862124cb49166fa554117b236a3e36a5710ae738e558a08ff3ca5a6fd0702b97cf3351711d4b0eb8aa9bf3af6e5d148ab27b8d8809452f65b1ce06218b528f75d05e5bb29e56cd09654f82bc43d44b6f3aa7fafa32b1a27620f3474156c36cccf4e752ec49950f5c4e5f94addec0ea460f351951496220f79adaa30e502bc1d910a2ebff84f97f0cb70a4c2763e473ed92591a568b2804", 0xcb) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) 21:04:56 executing program 4: add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz'}, &(0x7f0000000000)="89", 0x1, 0xfffffffffffffffb) 21:04:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x7d, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0, 0x3}, 0x20) 21:04:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={'%at\x00', 0x19, 0x2, 0x1d8, [0x20000140, 0x0, 0x0, 0x20000258, 0x20000288], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'rose0\x00', ' \x00\x00\xfa\x00\x00\x00\x13\x00', 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x250) 21:04:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) [ 481.445453] kernel msg: ebtables bug: please report to author: Valid hook without chain 21:04:57 executing program 2: gettid() timer_create(0x0, 0x0, &(0x7f0000000100)) timer_delete(0x0) 21:04:57 executing program 1: mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000440)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:04:57 executing program 0: syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00\x80\xf2]\xc1\xbc\xe5\x96\aU\xa9\xe5\xa05\x83.\xdd\xee\xab\xf3\xbe$\xdd\xd8\x16\xafs\x02\x80\x11<\x14dR\xd9\x98\xbb\x9c\x81\x98Kl\xc7s\x89$\xfd\x14[\x93\xe4z\xd4[\xf4\x86Y\xae\xdaB\xa6\xbcq\x00\xb2X\xad=\xce{\xaf\x02\xa9#\xc2-\xad\xf7\xa2q \b\x10\xb4Kn\xfc\xfe\a\xb9B\xd9>\x81r\x1c@-`\xe3\xe4O\x9b!') 21:04:57 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x49, 0x0, 0x40000001], [0xc1]}) 21:04:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) socket$kcm(0x29, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0xd03, 0x7fff, 0x9, 0xffffffff, 0x0, 0x2, 0x0, 0x4, 0xb5, 0x0, 0x0, 0x2, 0x7f, 0xffffffffffff56f7, 0x80, 0x2, 0x40, 0x9, 0x0, 0x400, 0xffffffff00000001, 0x1, 0xffffffffffffff01, 0x0, 0xfff, 0xfffffffffffffffc, 0x100000000, 0x790c, 0x8000, 0x0, 0x7ff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x1}, 0x200, 0xffff, 0x1, 0xe, 0x8, 0x9, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r5, 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r6, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x00', 0x80e}) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xa) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_type(r4, &(0x7f0000001900)='th\x88daded\x00', 0xfdef) 21:04:57 executing program 4: r0 = socket$kcm(0x10, 0x200000000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="23000000420081aee405e9a4000000000000c6ff07d800400300000000000000000000", 0x23}], 0x1}, 0x0) 21:04:57 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0x9}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="9c6e2065769413cfbfa37bc10dc050c91bba3f5e50f917ab5328f3b81eb5dc7d2a529164e468c1b567443802b65f71263bd4784523864ccf6c37232910b3a8958eba33deb8a1b5e316b996ea2fc3830fbda06f661e97a532517a35fa785b9bf33780b161ff548e51995f9ee2a7f7b1344706fdc41f2a88701d9be556d1fd78ee239dfd553f6bfe9f7f94926e5025ab31ecdd0f305f8eba1f5590b198218716c100"}, 0x10) socketpair(0xa, 0x5, 0x5, &(0x7f00000000c0)) 21:04:58 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(0xffffffffffffffff, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:04:58 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) gettid() connect$inet(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 21:04:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x100000000014, 0x4, 0x4, 0x39e1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x18) 21:04:58 executing program 5: connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 21:04:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="050000002300000049018900ac14140deb", 0x11}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 482.325260] ================================================================== [ 482.332702] BUG: KMSAN: uninit-value in __neigh_create+0x21fe/0x2630 [ 482.339214] CPU: 0 PID: 15960 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #2 [ 482.346405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.355769] Call Trace: [ 482.358436] dump_stack+0x1c9/0x220 [ 482.362124] kmsan_report+0x12d/0x290 [ 482.365959] __msan_warning+0x76/0xc0 [ 482.369798] __neigh_create+0x21fe/0x2630 [ 482.373992] ? is_console_locked+0x29/0x50 [ 482.378286] ip_finish_output2+0xa28/0x1590 [ 482.382654] ip_finish_output+0xd40/0xfe0 [ 482.386849] ip_output+0x559/0x620 [ 482.390428] ? ip_mc_finish_output+0x3b0/0x3b0 [ 482.395033] ? ip_finish_output+0xfe0/0xfe0 [ 482.399411] ip_local_out+0x164/0x1d0 [ 482.403259] iptunnel_xmit+0x8d3/0xe20 [ 482.407242] ip_tunnel_xmit+0x378c/0x3b50 [ 482.411491] ipgre_xmit+0xddc/0xec0 [ 482.415169] ? ipgre_close+0x230/0x230 [ 482.419097] dev_hard_start_xmit+0x627/0xc80 [ 482.423567] __dev_queue_xmit+0x3173/0x3cf0 [ 482.427979] dev_queue_xmit+0x4b/0x60 [ 482.431835] ? __netdev_pick_tx+0x1290/0x1290 [ 482.436352] packet_sendmsg+0x7cbd/0x9200 [ 482.440563] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.446057] ? rw_copy_check_uvector+0x149/0x6b0 [ 482.450845] ? __msan_poison_alloca+0x1e0/0x270 [ 482.455552] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 482.460951] ? aa_sk_perm+0x7ab/0x9e0 [ 482.464847] ___sys_sendmsg+0xdbc/0x11d0 [ 482.468971] ? compat_packet_setsockopt+0x360/0x360 21:04:58 executing program 2: 21:04:58 executing program 1: 21:04:58 executing program 4: r0 = socket$inet6(0xa, 0x10000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000580)=0x3ff, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:04:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) fstat(r3, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000f40)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:04:58 executing program 1: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x10232) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") close(r2) [ 482.474025] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 482.479426] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 482.484811] ? __fget_light+0x714/0x780 [ 482.488880] __se_sys_sendmsg+0x305/0x460 [ 482.493142] __x64_sys_sendmsg+0x4a/0x70 [ 482.497239] do_syscall_64+0xcd/0x110 [ 482.501071] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 482.506304] RIP: 0033:0x457669 [ 482.509525] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.528450] RSP: 002b:00007fc5b6f44c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 482.536182] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 482.543476] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 482.550767] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 482.558051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5b6f456d4 [ 482.565355] R13: 00000000004c43f7 R14: 00000000004d7388 R15: 00000000ffffffff [ 482.572659] [ 482.574296] Uninit was created at: [ 482.577843] No stack [ 482.580177] ================================================================== [ 482.587545] Disabling lock debugging due to kernel taint [ 482.593015] Kernel panic - not syncing: panic_on_warn set ... [ 482.598929] CPU: 0 PID: 15960 Comm: syz-executor3 Tainted: G B 4.20.0-rc5+ #2 [ 482.607515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.616879] Call Trace: [ 482.619494] dump_stack+0x1c9/0x220 [ 482.623158] panic+0x3f0/0x98f 21:04:58 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)='\"'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)='^'}) [ 482.626436] kmsan_report+0x290/0x290 [ 482.630294] __msan_warning+0x76/0xc0 [ 482.634166] __neigh_create+0x21fe/0x2630 [ 482.638368] ? is_console_locked+0x29/0x50 [ 482.642682] ip_finish_output2+0xa28/0x1590 [ 482.647070] ip_finish_output+0xd40/0xfe0 [ 482.651300] ip_output+0x559/0x620 [ 482.654931] ? ip_mc_finish_output+0x3b0/0x3b0 [ 482.659539] ? ip_finish_output+0xfe0/0xfe0 [ 482.663889] ip_local_out+0x164/0x1d0 [ 482.667742] iptunnel_xmit+0x8d3/0xe20 [ 482.671712] ip_tunnel_xmit+0x378c/0x3b50 [ 482.675959] ipgre_xmit+0xddc/0xec0 [ 482.679632] ? ipgre_close+0x230/0x230 [ 482.683556] dev_hard_start_xmit+0x627/0xc80 [ 482.688024] __dev_queue_xmit+0x3173/0x3cf0 [ 482.692424] dev_queue_xmit+0x4b/0x60 [ 482.696256] ? __netdev_pick_tx+0x1290/0x1290 [ 482.700783] packet_sendmsg+0x7cbd/0x9200 [ 482.704978] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.710456] ? rw_copy_check_uvector+0x149/0x6b0 [ 482.715233] ? __msan_poison_alloca+0x1e0/0x270 [ 482.719940] ? __msan_metadata_ptr_for_load_8+0x10/0x20 21:04:58 executing program 4: [ 482.725329] ? aa_sk_perm+0x7ab/0x9e0 [ 482.729219] ___sys_sendmsg+0xdbc/0x11d0 [ 482.733333] ? compat_packet_setsockopt+0x360/0x360 [ 482.738453] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 482.743864] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 482.749261] ? __fget_light+0x714/0x780 [ 482.753302] __se_sys_sendmsg+0x305/0x460 [ 482.757510] __x64_sys_sendmsg+0x4a/0x70 [ 482.761603] do_syscall_64+0xcd/0x110 [ 482.765443] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 482.770653] RIP: 0033:0x457669 [ 482.773865] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.775849] binder: 15974:15976 ioctl c0306201 0 returned -14 [ 482.792790] RSP: 002b:00007fc5b6f44c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 482.792811] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 482.792824] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 482.792837] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 482.792850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5b6f456d4 [ 482.792863] R13: 00000000004c43f7 R14: 00000000004d7388 R15: 00000000ffffffff [ 482.793950] Kernel Offset: disabled [ 482.847429] Rebooting in 86400 seconds..