f9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000a00)=@req={0x28, &(0x7f00000009c0)={'nr0\x00', @ifru_data=&(0x7f0000000980)="4bca6cde17a5f534b5e20df08a662da45557f84a84a3a37b9e85d031f87af80c"}}) 00:46:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu}}) 00:46:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 2: eventfd2(0x10000, 0x800) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x60002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r1, 0x800, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20044005) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000040)={{0x89, @local, 0x4e24, 0x0, 'fo\x00', 0x11, 0xb, 0x50}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4e21, 0x4, 0x7, 0x0, 0x2}}, 0x44) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200480}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r2, 0x0, 0x32, 0x40000001, 0x0, 0xffffffffffffff13) 00:46:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu}}) 00:46:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0x0, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:49 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$eventfd(r1, &(0x7f00000007c0)=0x44, 0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="5b0000007d020000003e000400ffff00000c020000000000000000000000000000a0ff070000800000800002000000000000030073797a030073797a02002f5c030073790100000000000000657440", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7], 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000880)=""/227) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="4e0000007d0200000047000000ffffffff00800000ce710001000000000000000000c74763abfb030073797a04006e617400030073797a0000000000000000000064fed309ebc06cd25a41d73eb11145bcb1b33f76035f686876f144571ed4451e7ab136eebb4e1e8c4a793a554960c7568ab8802381097fff51346c21a1b10500000000000000fd692c711ef377c09cd2c68a49"], 0x4e) unshare(0x40000000) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f00000003c0)) 00:46:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) dup(r0) 00:46:49 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 5: eventfd2(0x10000, 0x800) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x60002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r1, 0x800, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20044005) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000040)={{0x89, @local, 0x4e24, 0x0, 'fo\x00', 0x11, 0xb, 0x50}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4e21, 0x4, 0x7, 0x0, 0x2}}, 0x44) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200480}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r2, 0x0, 0x32, 0x40000001, 0x0, 0xffffffffffffff13) 00:46:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)) 00:46:49 executing program 5: r0 = socket(0x1, 0xa, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:49 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:49 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:49 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0x0, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000014c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0x104, 0xffffffffce5f1aaa, {"f43e22fa9211d74073d6f8b15d9a610d13a693fac403648e633e0cccdeaced7fa1a9c022b713244d610ecc4cd54f7950db0f933fdf53de57e3d22b1a929fbdc08461090405e1db7189038fab778e9fb055629735c8aacec238fb76da66e3eca5850476e4dc6fa22603ee2994715028aa0363f0add00117b3240891e6226f1a87dafa3374ce28071d00706c38eb9fd17db63a115a2bf733465d55d81105ac3a8fdd2de209eb92f24e5e1e91f4184b16952f4b257a18928367e2db4e376a2b424b609927feb1fff46ab9fa8e3ecb8e87978746c61388fb730038b2c023e730dcc5828849b0934e343268cc"}}, {0x0, "f1e28c692f93b54e9d2bd2928a52c34d04e072e016f2601fe25165c06ce8ce207f5f80d0c4a4e1d7b31924d2fb69bf1546e72ba6312cb26cec5b3e602c921b98b46786cc5f5279a291e88ded548296cc4119a294a35c11b3adba34313615a6edcbb53bd0a7a0c89da8c4c6b9ff783784c55715f2d6696fc70f28282219fe807157aa40ddb3d1e0ad25b8dc83d1898871ceea6674c9db7846a4dc681492f6cb4b1b7649b2f55a97384d3e2b8bf447994478110f8d947c5f73ebac9f18adf314890d5df1bf23e5e74ffdecff65f6fe29"}}, &(0x7f00000004c0)=""/4096, 0x1d5, 0x1000}, 0x20) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f0000001540)=@v1={0x1000000, [{0x7fffffff, 0xfed}]}, 0xc, 0x2) fcntl$getownex(r1, 0x10, &(0x7f0000001500)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400, 0x0) r3 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r2, r3, 0x2b, &(0x7f0000000040)={0x29, 0x1, 0xa15}) r4 = socket(0x40000000000010, 0x802, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write(r4, &(0x7f0000000180)="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", 0xfc) 00:46:50 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000003340)=0x6, 0xffffffffffffff6f) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003380)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4}}, {{@in=@initdev}}}, &(0x7f0000000000)=0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000003480)={{0x73, @empty, 0x4e23, 0x3, 'lblcr\x00', 0x20, 0x3, 0x2b}, {@remote, 0x4e23, 0x0, 0x4, 0x5, 0x6}}, 0x44) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000003b00)='/dev/full\x00', 0x200000000007ffd, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) llistxattr(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)=""/238, 0xee) prctl$PR_GET_SECUREBITS(0x1b) ptrace$setopts(0x4206, r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003600)='IPVS\x00') setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000003500)=r3, 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000003a40)={&(0x7f00000035c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000003a00)={&(0x7f0000003b40)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r5, @ANYBLOB="20022bbd7000fcdbdf250300000048000200080008000200000008000b000a00000008000700feffffff080008008156000014000100fffffffd0000418ec8000000000000000000000800040000000000080003000700000030000200080005008edc000008000300010000001400010000000000000000000000ffff00000400080004000080000014000300080001000100000008000300040000000800040001000000"], 0xa8}, 0x1, 0x0, 0x0, 0x4800}, 0x0) tkill(r4, 0x8) fcntl$setstatus(r3, 0x4, 0x42803) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000003680)={&(0x7f0000003540)={0x10, 0x0, 0x0, 0x2002c040}, 0xc, &(0x7f0000003640)={&(0x7f0000003800)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="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"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) recvmmsg(r0, &(0x7f00000031c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/217, 0xd9}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/186, 0xba}, {&(0x7f00000000c0)=""/54, 0x36}], 0x5, &(0x7f0000002400)=""/200, 0xc8}, 0x3}, {{&(0x7f0000002500)=@ipx, 0x80, &(0x7f0000002840)=[{&(0x7f0000002580)=""/238, 0xee}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000002680)=""/98, 0x62}, {&(0x7f0000002700)=""/150, 0x96}, {&(0x7f00000027c0)=""/86, 0x56}], 0x5, &(0x7f00000028c0)=""/192, 0xc0}, 0x901}, {{&(0x7f0000002980), 0x80, &(0x7f0000002b00)=[{&(0x7f0000002a00)=""/42, 0x2a}, {&(0x7f0000002a40)=""/165, 0xa5}], 0x2, &(0x7f0000002b40)=""/68, 0x44}, 0x1}, {{&(0x7f0000002bc0)=@generic, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002c40)=""/63, 0x3f}, {&(0x7f0000002c80)=""/73, 0x49}, {&(0x7f0000002d00)=""/196, 0xc4}, {&(0x7f0000002e00)=""/223, 0xdf}], 0x4}, 0x4}, {{&(0x7f0000002f40)=@l2, 0x80, &(0x7f0000003140)=[{&(0x7f0000002fc0)=""/89, 0x59}, {&(0x7f0000003040)=""/210, 0xd2}], 0x2, &(0x7f0000003180)=""/32, 0x20}, 0x3f}], 0x5, 0x0, &(0x7f0000003300)={0x0, 0x989680}) 00:46:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) listen(r0, 0x3) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) recvfrom$unix(r1, &(0x7f0000000080)=""/90, 0x5a, 0x21, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0xa0002, 0x0) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) r3 = fcntl$getown(r2, 0x9) ptrace$getregset(0x4204, r3, 0x6, &(0x7f0000000340)={&(0x7f0000000240)=""/217, 0xd9}) 00:46:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0x0, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:50 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) r4 = epoll_create(0x3) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) r5 = add_key(&(0x7f0000000880)='blacklist\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="2a29853bde768fd964395f8ef3eb875276875ca1801c673e4dab9a7f4826a9c5ea071f59d4ca2b8a31cee7847983d4d7e7fcbc04a1ee24be35aebb5af2bb9dac0f6675a7eb3ad53f1e577c3f86e95785ad03fb4653688eeafc7cfe5accd3c670970eacc3d9d28eb8cc8dfe5d1ff6fb45c5c81645d63f53254a61dd15efcce22a1736b99c8fae2734c5525d512df002c2c80dd53812aaccc5e10701e7685a618235e1316820fe7f0403df92a533c80a7793e78d8c69a3420e34fb35f9648397a8dd", 0xc1, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f0000000ac0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r5, &(0x7f0000000a00)='user\x00', &(0x7f0000000a40)={'syz', 0x1}, r6) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$cgroup_type(r1, &(0x7f00000003c0)='threaded\x00', 0x9) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="5b0000007d020000003e000400ffff00000c02000000000000000000000000000000000000030073797a030073797a02002f5c010073797a0800406370757365744000000000000000000000000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10], 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, r7) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="4e0000007d0200000047000000020000000a0100000001000000000000010000000201041f000000000000000000000000000a0080438d7f5ac70663abfb030073797a04406e617400030073797a5c7d862616e354fa8f57c11e0ba823152056"], 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)) write$P9_RSTATu(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:50 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000880)=""/95) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:50 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@local, @mcast1, @remote, 0x5da, 0x4, 0x6, 0x100, 0x3, 0x100000, r1}) 00:46:50 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$inet(0x2, 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000300)) bind$inet(r1, &(0x7f0000000200)={0x2, 0x8004e22}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RXATTRCREATE(r2, &(0x7f00000005c0)={0x7, 0x21, 0x1}, 0x7) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000480)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000053000000adea41f705e16d400d6e36817a2a5aac8833474165d0fa9e0bce040000005d26388c184fa976d960d418b6e96d5b985d538b5f20efb757a1df7cc8b727a1e8b8d5774a52043fa662df7f7c98b41ada718db8bf057c01035a0b3b8c2496b10cf069ea4d1f56f05e271c934a8a612dcdc9270ac6438d61cb74b4e243b5e1aa9d28cc296fe9c48dde210062e63d111dbe36de96dcd3c3f0c669931b1cf339af5b6165c51d2d67066ebc877ef0de3b04b44e1f5005ccab89173e1f18c06ce983a0e30a4af8c307ccc74cf887771cf4ad585b38f6b52e1e979ec00332a9bba167ecdb1b592ee90defe21e29e310dfdecefd82130f5d4cad6f096c74fc0a6a74"], &(0x7f0000000080)=0x77) getpeername$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) recvfrom$inet(r4, &(0x7f0000000340)=""/208, 0xd0, 0x10100, &(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) write$cgroup_type(r3, &(0x7f0000000280)='threaded\x00', 0x15e) write$cgroup_type(r3, &(0x7f0000000240)='threaded\x00', 0x9) recvfrom(r1, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:51 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)) write$P9_RSTATu(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22, 0x0, 0x62}}) 00:46:51 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000880)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r1, 0x400, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='/dev/uhid\x00') write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) socket$inet6(0xa, 0x3, 0xba) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 4: r0 = socket$inet(0x2, 0xa98f0542dc5380c2, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x210) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup2(r2, r1) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) r3 = dup3(r0, r0, 0x80000) write$P9_RRENAME(r3, &(0x7f0000000040)={0x2, 0x15, 0x1}, 0xfffffffffffffdf0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000080)="00efcdb8be3ce23c3ad575f467c661dcfb402da290013eb1f7bc078aa8c955aec5104000092d968818c110af1dce1244463cd08492decf772eeb58347430f4d956e6cb64351c838a601783600e4dae1a66cbde28ab3fe24a781023f8afcad3bd2a167c8ff0503087e703451c63339429a021720d", 0x74, 0x4000, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x5ad}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000004240)=""/4096) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:51 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x62}}) 00:46:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x62}}) 00:46:51 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000880)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r1, 0x400, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='/dev/uhid\x00') write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) socket$inet6(0xa, 0x3, 0xba) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:51 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x62}}) 00:46:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) socket$packet(0x11, 0x9, 0x300) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f00000000c0)=0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:52 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22}}) 00:46:52 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:52 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000880)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r1, 0x400, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='/dev/uhid\x00') write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) socket$inet6(0xa, 0x3, 0xba) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:52 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:52 executing program 4: r0 = socket$inet(0x2, 0xa98f0542dc5380c2, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x210) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup2(r2, r1) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) r3 = dup3(r0, r0, 0x80000) write$P9_RRENAME(r3, &(0x7f0000000040)={0x2, 0x15, 0x1}, 0xfffffffffffffdf0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000080)="00efcdb8be3ce23c3ad575f467c661dcfb402da290013eb1f7bc078aa8c955aec5104000092d968818c110af1dce1244463cd08492decf772eeb58347430f4d956e6cb64351c838a601783600e4dae1a66cbde28ab3fe24a781023f8afcad3bd2a167c8ff0503087e703451c63339429a021720d", 0x74, 0x4000, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x5ad}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000004240)=""/4096) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:52 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) getdents64(r0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000100)=""/190, 0xbe) r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e1d, @broadcast}, 0xb) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r1, 0x0, 0x0, 0x102, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@empty, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xffffffffffffffd7) 00:46:52 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22}}) 00:46:52 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:52 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="4e0000007d0200000047000000020000000a01000000010000af4f12fb98c4adfe092dd7fdd94bc376000000000000000002010400000100000020000000000000000a0080438d7f5ac74763abfb"], 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:52 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x22}}) 00:46:52 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/76) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a307380c8e2427e67fe41d696513681873bda8e44fcaa33e1f88b664ddbd33ab97233ca007049865cf4f37e1cd8467f7c6529ab150992250704e9444f19f0eb3d6503ea9b22d53e325adefee957333e5d86abf41c14b11deab3a6485a1befce3b9dd45943b97715656b49e1d97cdacc422f43b6a9d4a79684c4a58044d470f28673476a296150e3006ec58c2e9386d1edfefed134489509997a00000000000000000000"], 0xa6) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="46f88afda666ab0537eabdc3a5c9b56eefa9ec15beebd90e12b997de692e0349e462ffde378de50c4db8ef142ef25af5ce9223e613518489c73096658c3eec764b23fa3c86028fa86d3bb8", 0x4b, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000440)='dns_resolver\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="22ad40f78f6d365520d37222fd0d431e2c58923a73927e3fbbb4b2065326091f638ce1cc2bf6362374ebe5672888cea07f7db10f1ecbdf2b78fb0e7832572e61b33299c8a216a5cd704af97feb874256c1b3f9c6912ef13add4b5220a879b8fd63436797bb8350f1971a78cc79d1eda2048f4e41744ab7ddfd487a0267bf5b866aac6c2cc9a4eb4c10545866cf6b7b3ae936daa0eadeaae26f9f0b3caf57232267e1d9709459782a50ec8fada37e0978325b7b0e4814b5", 0xb7, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x480200, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x14) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x851260ecb56d70c2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000300", @ANYRES16=r4, @ANYRESDEC=r3], 0x3}, 0x1, 0x0, 0x0, 0x24008084}, 0x4000) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x22) 00:46:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe}]}, 0x14, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000180)=""/55, 0x37}, {&(0x7f00000001c0)}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000480)=""/226, 0xe2}], 0x7, &(0x7f0000000600)=""/124, 0x7c}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:53 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x3c, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000880)={0x1f, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x4000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:53 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:53 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x29, 0x2a, 0x14, 0x2, 0x5, 0xdf20, 0x4, 0x6b}}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:54 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:54 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000040), 0x0) 00:46:54 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) 00:46:54 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:46:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:54 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) 00:46:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2000000000000000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:55 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) 00:46:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:55 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:55 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:55 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:55 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, 0x0, 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:55 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:55 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffff8b) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:56 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, 0x0, 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x2bb) 00:46:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 00:46:56 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, 0x0, 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:56 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0), 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, r5, r6}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', 0x0, 0x0, 0x3) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x64}}) 00:46:57 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0), 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x64}}) 00:46:57 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x8, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7, 0x8}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)=0x9, 0x4) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="5b0000007d02003aae16b273023e2a00000c020000000000000000000000000000a0ff070000800100000002000000000000030073797a030273797a02002f5c030073797a08004063727a896c2d34bc2eb9d11531deeb4f757365744085ce", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7], 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) waitid(0x3, r2, &(0x7f0000000880), 0x100000a, &(0x7f0000000900)) 00:46:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) io_setup(0x559, &(0x7f0000000040)=0x0) io_destroy(r1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x64}}) 00:46:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e}}) 00:46:57 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0), 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e}}) 00:46:57 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:57 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:57 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, 0x1e}}) 00:46:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1", 0x12) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:57 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x200000000006, 0x8d) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:46:58 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1", 0x12) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:58 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:58 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:58 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:58 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1", 0x12) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:58 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:46:58 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:58 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f", 0x1b) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f", 0x1b) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:59 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:59 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x22) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x5c, @multicast2, 0x4e22, 0x4, 'wlc\x00', 0x10, 0x5, 0xc}, {@empty, 0x4e23, 0x2, 0x9, 0x9220, 0x1}}, 0x44) r1 = socket$inet(0x2, 0x2, 0x8110) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r1, 0x1, 0x27, &(0x7f00000000c0)=0x5, 0x111) recvfrom(r1, 0x0, 0x0, 0x102, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x400) 00:46:59 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:59 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:59 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:46:59 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x666f) 00:46:59 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:46:59 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f", 0x1b) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:46:59 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:00 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:00 executing program 2: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x3eb) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x2, r3, 0x80) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x19b) setsockopt$sock_int(r2, 0x1, 0x3d, &(0x7f0000000040)=0x5, 0x4) recvfrom(r2, 0x0, 0x0, 0xfe, 0x0, 0x39a) arch_prctl$ARCH_GET_CPUID(0x1011) clock_getres(0x3, &(0x7f00000000c0)) 00:47:00 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:00 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000240)="07fff90b3779d6e06f76bc48c52aa3f5de58e66b106f83bf796730d56d4f97fb07d83b52234377db61c53f8c32a2acb6cf19218d3c31255795775b3d9dac332cd4fa9555b3d162b9be63498b5fb563dd2ff1e153e8af112709c18bf64f6b6d1414620833c0b978ac006c3fed92a44832107bcf65ec71f722657aa016ddb1595608ec859a7f29fcf20ec949917c82a73bc4a0b6c4beeac0f502e82b1c1a15510fb9c1db69cf8bb87ab5494e3a1f6ed4fc23a426132656e47a8bb2be4b7ea13876c5f247eb25c5e96f213ac96bcb678911d020a252cb6acca4d93b58b447c7190608c98fa9e4eef27220efa4d605d14c20e82c53512e5dd183d8") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r1, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c8", 0x22) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccf", 0x20) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:00 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:01 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:01 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c8", 0x22) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:01 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:01 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:01 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:01 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x692100, 0x0) sendto$inet(r0, 0x0, 0xffffff33, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000001c0)=0xa, 0xfffffffffffffe13) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000000c0)=0x80, 0x80800) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000100)={0x7ff, 0x6, 0x1f}, 0xc) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x8) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x600800, 0x0) accept$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000500)={@rand_addr="aa356a5dcd6fa934789e3db7feda95c4", 0x4e, r4}) renameat2(r2, &(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00', 0x7) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x102, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@empty, @in6=@dev}}, {{@in6=@mcast1}}}, &(0x7f0000000440)=0xe8) 00:47:01 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c8", 0x22) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:01 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:01 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c826", 0x23) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:02 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:02 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x800, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:02 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:02 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:02 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:02 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:02 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:02 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c826", 0x23) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:02 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c826", 0x23) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0xfffffffffffffe88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:03 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) getsockname(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @initdev}}, &(0x7f00000000c0)=0x80) 00:47:04 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:04 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:04 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:04 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:04 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, 0x0, 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:04 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:04 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, 0x0, 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0xff, 0x0, 0x27d) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCNXCL(r1, 0x540d) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:05 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:05 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 2: lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', '},$[\x00'}) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23}, 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000240)={{0x2, 0x4e20, @multicast1}, {0x1, @local}, 0x8, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bridge0\x00'}) 00:47:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, 0x0, 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:06 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:06 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) getpeername(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f00000000c0)=0x80) 00:47:06 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, 0x0, 0x0) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, 0x0, 0x0) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:06 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:07 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:07 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:07 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, 0x0, 0x0) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:07 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:07 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:07 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:07 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x0, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xd4, 0x0, {"048a327a9e5294f4586ff90d6d1619f120565b00b778271a21773538a3c86e7ca8dda4cb053d28b1983d36fcaa0388d1e7d12846b3a2e5091d4c4f4c0458ee780ba8e7bf2c6e7342a185e1ff9af218ac72bee32477431e6a7877db748b6c4cb4ce83b612fbdb6faae18b6d1a0fcee53e837d2c77fed93c69f68d5787a364536dd1b3a427b319493057e504b35543dda446cd3e8d83714e22c1325f4a7b2c5b3716bdb49508f3390ea2b724f5400e347f4f111d91653d1cb295"}}, {0x0, "80450e7b866593dc1645ef224e9d57b46ac6636c990070e2ba6d3daeb7b42cf9"}}, &(0x7f0000000080)=""/26, 0xf6, 0x1a, 0x1}, 0x20) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)=0x9) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x1f5, 0x8000004003ffe, &(0x7f0000000140)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x54c) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r1, 0x0, 0x0, 0x102, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000180)={0xbc, 0x4, 0xc69c}, 0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) 00:47:08 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x0, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:08 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:08 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:08 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x0, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', 0x0, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:08 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'hwsim0\x00', {0x2, 0x4e24, @rand_addr=0x2}}) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x0) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:09 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:09 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:09 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', 0x0, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:09 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x0, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:09 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:09 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x0, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:10 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', 0x0, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:10 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:10 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:10 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x0, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x2007, {{0x2, 0x9, @loopback}}}, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x40) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:10 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:10 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:10 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:11 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x0, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:11 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) accept$inet6(r1, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 00:47:12 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0x0, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:12 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:12 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:12 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:12 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:12 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0x0, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:12 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:12 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0x0, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:13 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x0, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:13 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:13 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x0, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:14 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:14 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:14 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x0, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:14 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:14 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:14 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:14 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:14 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:15 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:15 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:15 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:15 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:15 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:15 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:16 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:16 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x0, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:16 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:16 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x0, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:16 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:17 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:17 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:17 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:17 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x0, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x0, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:17 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:17 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:17 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:18 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x0, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:18 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:18 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:18 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:18 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:18 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:18 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:19 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x0, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:19 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x0, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:19 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x0, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:19 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:19 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:19 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:19 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:19 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x0, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x0, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x0, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x0, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x0, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 2: 00:47:20 executing program 4: 00:47:20 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:20 executing program 4: 00:47:20 executing program 4: 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:20 executing program 4: 00:47:21 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:21 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 4: 00:47:21 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:21 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:21 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:21 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, 0x0, 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, 0x0, 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:21 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:22 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:22 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, 0x0, 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:22 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:22 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:23 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:23 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r1, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(0xffffffffffffffff, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r0, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:23 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:23 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:23 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:23 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:24 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:24 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:24 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:24 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r1, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:24 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:24 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:24 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:24 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:24 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:24 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:25 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:25 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:25 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:26 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:26 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r3 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r2, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r4, 0x0, r5}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r3, 0x8, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r1, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:26 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r1, &(0x7f0000002c80), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:26 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz'}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:26 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz'}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:26 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 00:47:26 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(0x0, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:27 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz'}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:27 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r1, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:27 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:27 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:27 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:28 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:28 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r1, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79b044b46fe000000bc00020000036c6c256f1a275796ff7f512fd633d44000007600008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f6eff60cec18444ef92e475ef8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201dee515b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a60467b4df715587b9ebe52302d4b792801fe4af3d0041f0d421f8ffffff6f0000080548cab99fb0ba92fb327ac5198c83f3deac270e33", 0xfc) 00:47:28 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:28 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x0, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:28 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:29 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:29 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x0, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 2: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) 00:47:30 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x0, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 1: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:30 executing program 0: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a0780", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r5, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) write(r0, &(0x7f0000000180)="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", 0xfc) 00:47:30 executing program 4: r0 = socket(0x40000000000010, 0x802, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "12365bef9d7de9d3"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=',|', 0x2}], 0x1}, 0xc100) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a80)="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", 0x10d}], 0x1}, 0x8000) recvmmsg(r2, &(0x7f0000002c80), 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000480)={{0x3, 0x0, 0x7fff, 0x3, 0x2}, 0x6, 0x5}) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r4, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 00:47:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x0, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x0, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, 0x0, r6}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_mtu=0x7ff}}) 00:47:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) 00:47:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) 00:47:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x3d2, 0x0, 0x5, 0x2, 0x0, 0x20, 0x40, 0x2, 0x7, 0x5, 0xfffffffffffffff8, 0x0, 0x1b8, 0x4, 0x3f, 0x3ff, 0x7ff, 0x4, 0x1000, 0x4, 0x1000, 0x3, 0x6, 0x3, 0x6, 0x3, 0x7, 0x3f, 0x8, 0x1, 0x0, 0x5, 0x5, 0x5, 0xffffffffffff0001, 0xfffffffffffffff9, 0x0, 0xa7dd, 0x0, @perf_config_ext={0x7}, 0x800, 0x100, 0x9c7, 0x7, 0x1, 0x676e}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) epoll_create(0x3) r4 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x5) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setlease(r3, 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0x5b, 0x7d, 0x2, {{0x0, 0x3e, 0x4, 0xffff, {0xc, 0x2}, 0xa0000000, 0x7ff, 0x80, 0x200, 0x3, 'syz', 0x3, 'syz', 0x2, '/\\', 0x3, 'syz'}, 0x8, '@cpuset@', r5, r6, r7}}, 0x5b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000840)=0x15) fcntl$setown(r4, 0x8, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0x6}, {0xefe, 0x771d}]}, 0x14, 0x3) write(r0, &(0x7f00000001c0)="28fabd73147eefef9e2e392f85b762298cd1fba35af2d8f03ad54f12ced96ccfa8c82644", 0x24) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) write$P9_RSTAT(r1, &(0x7f00000007c0)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x5, 0x2, {0xa, 0x1, 0x1}, 0x2000000, 0x401, 0x100000001, 0x20, 0xa, '\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x3, 'syz', 0x4, 'nat\x00', 0x3, 'syz'}}, 0x4e) unshare(0x40000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x58100, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) [ 714.730728] INFO: task kworker/u4:5:2060 blocked for more than 140 seconds. [ 714.738105] Not tainted 4.14.105+ #29 [ 714.758917] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 714.809311] kworker/u4:5 D27376 2060 2 0x80000000 [ 714.832590] Workqueue: netns cleanup_net [ 714.841827] Call Trace: [ 714.850584] ? __schedule+0x91c/0x1f30 [ 714.865961] ? __sched_text_start+0x8/0x8 [ 714.880335] ? lock_downgrade+0x5d0/0x5d0 [ 714.889508] ? lock_acquire+0x10f/0x380 [ 714.899754] ? __mutex_lock+0x2c1/0x1430 [ 714.908901] schedule+0x92/0x1c0 [ 714.917318] schedule_preempt_disabled+0x13/0x20 [ 714.928279] __mutex_lock+0x559/0x1430 [ 714.938391] ? queue_work_on+0x70/0xa0 [ 714.948506] ? cleanup_net+0x136/0x860 [ 714.957430] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 714.970499] ? mark_held_locks+0xa6/0xf0 [ 714.979533] ? cleanup_net+0x136/0x860 [ 714.984015] cleanup_net+0x136/0x860 [ 714.992473] ? net_drop_ns.part.0+0x70/0x70 [ 715.021132] ? lock_acquire+0x10f/0x380 [ 715.027660] process_one_work+0x7c6/0x14e0 [ 715.034671] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 715.039500] worker_thread+0x5d7/0x1080 [ 715.043886] ? process_one_work+0x14e0/0x14e0 [ 715.048381] kthread+0x310/0x420 [ 715.051994] ? kthread_create_on_node+0xf0/0xf0 [ 715.056668] ret_from_fork+0x3a/0x50 [ 715.061919] [ 715.061919] Showing all locks held in the system: [ 715.068250] 1 lock held by khungtaskd/23: [ 715.072620] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a [ 715.081671] 2 locks held by getty/1735: [ 715.085638] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x22/0x80 [ 715.094596] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1f7/0x1700 [ 715.104167] 3 locks held by kworker/u4:5/2060: [ 715.108731] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x6e5/0x14e0 [ 715.117420] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x71b/0x14e0 [ 715.126542] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x136/0x860 [ 715.134601] 1 lock held by syz-executor.0/21469: [ 715.139347] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.147350] 1 lock held by syz-executor.4/21493: [ 715.152110] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.160102] 1 lock held by syz-executor.1/21508: [ 715.164840] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.172840] 1 lock held by syz-executor.5/21544: [ 715.177582] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.185577] 1 lock held by syz-executor.2/21580: [ 715.190343] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.198403] 1 lock held by syz-executor.5/21584: [ 715.203183] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.211182] 1 lock held by syz-executor.4/21602: [ 715.215922] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.223931] 1 lock held by syz-executor.5/21613: [ 715.228669] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.236681] 1 lock held by syz-executor.3/21621: [ 715.241439] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.249420] 1 lock held by syz-executor.3/21673: [ 715.254373] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.262385] 1 lock held by syz-executor.3/21690: [ 715.267130] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.275144] 1 lock held by syz-executor.3/21706: [ 715.279889] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.287903] 1 lock held by syz-executor.4/21707: [ 715.292667] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.300681] 1 lock held by syz-executor.0/21711: [ 715.305420] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.313432] 1 lock held by syz-executor.4/21735: [ 715.318174] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.326187] 1 lock held by syz-executor.5/21749: [ 715.330952] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.338931] 1 lock held by syz-executor.4/21767: [ 715.343703] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.351700] 1 lock held by syz-executor.1/21770: [ 715.356442] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.364453] 1 lock held by syz-executor.5/21802: [ 715.369197] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.377209] 1 lock held by syz-executor.4/21817: [ 715.381972] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.390091] 1 lock held by syz-executor.3/21823: [ 715.394838] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.402870] 1 lock held by syz-executor.2/21824: [ 715.407611] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.415624] 1 lock held by syz-executor.4/21840: [ 715.420382] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.428362] 1 lock held by syz-executor.2/21853: [ 715.433136] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.441135] 1 lock held by syz-executor.5/21901: [ 715.445873] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.453897] 1 lock held by syz-executor.4/21926: [ 715.458646] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.466650] 1 lock held by syz-executor.5/21927: [ 715.471393] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.479354] 1 lock held by syz-executor.0/21930: [ 715.484101] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.492076] 1 lock held by syz-executor.3/21952: [ 715.496806] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.504790] 1 lock held by syz-executor.4/21979: [ 715.509620] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.517599] 1 lock held by syz-executor.3/21982: [ 715.522341] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.530330] 1 lock held by syz-executor.1/21983: [ 715.535061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.543038] 1 lock held by syz-executor.4/22003: [ 715.547771] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.555742] 1 lock held by syz-executor.1/22010: [ 715.560494] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.568449] 1 lock held by syz-executor.4/22027: [ 715.573192] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.581161] 1 lock held by syz-executor.1/22040: [ 715.585890] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.593860] 1 lock held by syz-executor.1/22050: [ 715.598590] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.606559] 1 lock held by syz-executor.2/22057: [ 715.611308] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.619265] 1 lock held by syz-executor.2/22076: [ 715.624005] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.631982] 1 lock held by syz-executor.0/22077: [ 715.636712] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.644679] 1 lock held by syz-executor.1/22078: [ 715.649410] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.657382] 1 lock held by syz-executor.0/22101: [ 715.662123] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.670090] 1 lock held by syz-executor.2/22102: [ 715.674819] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.682897] 1 lock held by syz-executor.1/22104: [ 715.687628] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.695598] 1 lock held by syz-executor.3/22122: [ 715.700339] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.708321] 1 lock held by syz-executor.0/22124: [ 715.713061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.721028] 1 lock held by syz-executor.2/22128: [ 715.725756] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.733725] 1 lock held by syz-executor.1/22142: [ 715.738453] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.746420] 1 lock held by syz-executor.3/22147: [ 715.751171] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.759128] 1 lock held by syz-executor.4/22171: [ 715.763873] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.771842] 1 lock held by syz-executor.5/22173: [ 715.776572] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.784548] 1 lock held by syz-executor.2/22175: [ 715.789276] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.797350] 1 lock held by syz-executor.4/22192: [ 715.802092] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.810057] 1 lock held by syz-executor.5/22195: [ 715.814789] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.822760] 1 lock held by syz-executor.0/22213: [ 715.827489] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.835457] 1 lock held by syz-executor.3/22218: [ 715.840292] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.848260] 1 lock held by syz-executor.1/22224: [ 715.853096] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.861067] 1 lock held by syz-executor.5/22252: [ 715.865801] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.873769] 1 lock held by syz-executor.0/22260: [ 715.878590] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.886558] 1 lock held by syz-executor.4/22285: [ 715.891306] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.899264] 1 lock held by syz-executor.3/22292: [ 715.904017] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.911986] 1 lock held by syz-executor.5/22302: [ 715.916715] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.924685] 1 lock held by syz-executor.0/22306: [ 715.929414] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.937382] 1 lock held by syz-executor.3/22323: [ 715.942121] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.950089] 1 lock held by syz-executor.0/22340: [ 715.954820] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.962802] 1 lock held by syz-executor.4/22352: [ 715.967531] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.975501] 1 lock held by syz-executor.3/22361: [ 715.980245] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 715.988718] 1 lock held by syz-executor.1/22382: [ 715.993483] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.001461] 1 lock held by syz-executor.4/22393: [ 716.006189] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.014161] 1 lock held by syz-executor.5/22428: [ 716.018891] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.026860] 1 lock held by syz-executor.5/22459: [ 716.031604] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.039561] 1 lock held by syz-executor.4/22482: [ 716.044311] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.052291] 1 lock held by syz-executor.1/22497: [ 716.057021] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.065000] 1 lock held by syz-executor.0/22500: [ 716.069733] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.077702] 1 lock held by syz-executor.5/22502: [ 716.082444] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.090415] 1 lock held by syz-executor.4/22508: [ 716.095145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.103113] 1 lock held by syz-executor.2/22539: [ 716.107841] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.115809] 1 lock held by syz-executor.0/22543: [ 716.120550] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.128596] 1 lock held by syz-executor.5/22548: [ 716.133341] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.141311] 1 lock held by syz-executor.4/22552: [ 716.146040] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.154023] 1 lock held by syz-executor.0/22583: [ 716.158755] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.166727] 1 lock held by syz-executor.3/22626: [ 716.171557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.179514] 1 lock held by syz-executor.3/22643: [ 716.184266] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.192235] 1 lock held by syz-executor.4/22644: [ 716.196974] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.204945] 1 lock held by syz-executor.1/22666: [ 716.209674] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.217643] 1 lock held by syz-executor.4/22669: [ 716.222399] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.230367] 1 lock held by syz-executor.3/22674: [ 716.235096] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.243064] 1 lock held by syz-executor.0/22676: [ 716.247802] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.255773] 1 lock held by syz-executor.1/22699: [ 716.260528] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.268489] 1 lock held by syz-executor.3/22703: [ 716.273259] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.281231] 1 lock held by syz-executor.0/22731: [ 716.285970] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.293940] 1 lock held by syz-executor.3/22733: [ 716.298672] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.306643] 1 lock held by syz-executor.5/22751: [ 716.311385] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.319343] 1 lock held by syz-executor.2/22756: [ 716.324088] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.332057] 1 lock held by syz-executor.1/22768: [ 716.336787] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.344758] 1 lock held by syz-executor.0/22776: [ 716.349488] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.357554] 1 lock held by syz-executor.5/22789: [ 716.362297] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.370267] 1 lock held by syz-executor.1/22866: [ 716.374998] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.382968] 1 lock held by syz-executor.3/22905: [ 716.387698] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.395666] 1 lock held by syz-executor.4/22917: [ 716.400409] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.408367] 1 lock held by syz-executor.3/22934: [ 716.413108] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.421075] 1 lock held by syz-executor.1/22940: [ 716.425812] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.433780] 1 lock held by syz-executor.3/22965: [ 716.438511] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.446480] 1 lock held by syz-executor.0/22971: [ 716.451243] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.459201] 1 lock held by syz-executor.1/22975: [ 716.463948] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.471930] 1 lock held by syz-executor.0/23016: [ 716.476662] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.484634] 1 lock held by syz-executor.2/23022: [ 716.489366] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.497347] 1 lock held by syz-executor.1/23053: [ 716.502091] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.510081] 1 lock held by syz-executor.2/23056: [ 716.514822] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.522906] 1 lock held by syz-executor.1/23086: [ 716.527635] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.535608] 1 lock held by syz-executor.1/23120: [ 716.540352] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.548311] 1 lock held by syz-executor.0/23142: [ 716.553056] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.561025] 1 lock held by syz-executor.5/23145: [ 716.565763] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.573739] 1 lock held by syz-executor.0/23169: [ 716.578468] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.586437] 1 lock held by syz-executor.0/23195: [ 716.591178] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.599141] 1 lock held by syz-executor.5/23198: [ 716.603884] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.611948] 1 lock held by syz-executor.1/23214: [ 716.616698] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.624681] 1 lock held by syz-executor.2/23213: [ 716.629412] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.637403] 1 lock held by syz-executor.1/23234: [ 716.642145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.650113] 1 lock held by syz-executor.2/23235: [ 716.654845] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.662826] 1 lock held by syz-executor.3/23266: [ 716.667559] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.675529] 1 lock held by syz-executor.1/23277: [ 716.680273] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.688233] 1 lock held by syz-executor.3/23302: [ 716.692976] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.700945] 1 lock held by syz-executor.5/23321: [ 716.705675] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.713643] 1 lock held by syz-executor.1/23322: [ 716.718373] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.726342] 1 lock held by syz-executor.0/23324: [ 716.731084] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.739038] 1 lock held by syz-executor.4/23388: [ 716.743788] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.751755] 1 lock held by syz-executor.4/23395: [ 716.756485] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.764454] 1 lock held by syz-executor.4/23402: [ 716.769183] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.777172] 1 lock held by syz-executor.4/23417: [ 716.781923] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.789881] 1 lock held by syz-executor.3/23425: [ 716.794622] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.802594] 1 lock held by syz-executor.5/23452: [ 716.807323] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.815306] 1 lock held by syz-executor.0/23453: [ 716.820549] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.828516] 1 lock held by syz-executor.2/23454: [ 716.833263] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.841234] 1 lock held by syz-executor.2/23480: [ 716.845962] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.853935] 1 lock held by syz-executor.5/23483: [ 716.858666] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.866635] 1 lock held by syz-executor.0/23490: [ 716.871378] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.879337] 1 lock held by syz-executor.2/23503: [ 716.884083] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.892052] 1 lock held by syz-executor.2/23536: [ 716.896781] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.904945] 1 lock held by syz-executor.5/23537: [ 716.909688] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.917661] 1 lock held by syz-executor.5/23559: [ 716.922406] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.930379] 1 lock held by syz-executor.0/23610: [ 716.935112] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.943204] 1 lock held by syz-executor.4/23614: [ 716.947936] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.955993] 1 lock held by syz-executor.0/23625: [ 716.960735] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.968693] 1 lock held by syz-executor.4/23639: [ 716.973440] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.981409] 1 lock held by syz-executor.4/23653: [ 716.986140] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 716.994114] 1 lock held by syz-executor.5/23668: [ 716.998843] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.006813] 1 lock held by syz-executor.2/23669: [ 717.011557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.019514] 1 lock held by syz-executor.2/23689: [ 717.024257] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.032237] 1 lock held by syz-executor.1/23694: [ 717.036968] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.044937] 1 lock held by syz-executor.5/23700: [ 717.049671] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.057645] 1 lock held by syz-executor.3/23722: [ 717.062385] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.070356] 1 lock held by syz-executor.1/23725: [ 717.075085] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.083056] 1 lock held by syz-executor.0/23741: [ 717.087792] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.095760] 1 lock held by syz-executor.5/23743: [ 717.100507] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.108472] 1 lock held by syz-executor.3/23749: [ 717.113216] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.121189] 1 lock held by syz-executor.4/23767: [ 717.125920] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.133889] 1 lock held by syz-executor.5/23779: [ 717.138619] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.146588] 1 lock held by syz-executor.3/23780: [ 717.151330] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.159298] 1 lock held by syz-executor.2/23810: [ 717.164039] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.172007] 1 lock held by syz-executor.5/23829: [ 717.176737] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.184708] 1 lock held by syz-executor.0/23839: [ 717.189438] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.197407] 1 lock held by syz-executor.2/23859: [ 717.202149] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.210127] 1 lock held by syz-executor.1/23860: [ 717.214859] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.222838] 1 lock held by syz-executor.2/23877: [ 717.227566] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.235536] 1 lock held by syz-executor.1/23884: [ 717.240291] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.248248] 1 lock held by syz-executor.1/23903: [ 717.252987] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.260957] 1 lock held by syz-executor.3/23908: [ 717.265686] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.273672] 1 lock held by syz-executor.2/23940: [ 717.278403] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.286372] 1 lock held by syz-executor.3/23942: [ 717.291115] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.299087] 1 lock held by syz-executor.3/23960: [ 717.303827] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.311796] 1 lock held by syz-executor.3/23974: [ 717.316528] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.324497] 1 lock held by syz-executor.2/23976: [ 717.329235] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.337202] 1 lock held by syz-executor.3/23992: [ 717.341946] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.349901] 1 lock held by syz-executor.2/23994: [ 717.354641] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.362611] 1 lock held by syz-executor.3/24021: [ 717.367341] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.375309] 1 lock held by syz-executor.2/24030: [ 717.380053] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.388010] 1 lock held by syz-executor.0/24031: [ 717.392752] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.400721] 1 lock held by syz-executor.5/24054: [ 717.405467] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.413438] 1 lock held by syz-executor.4/24079: [ 717.418183] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.426160] 1 lock held by syz-executor.2/24081: [ 717.430903] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.438861] 1 lock held by syz-executor.1/24119: [ 717.443604] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.451575] 1 lock held by syz-executor.0/24134: [ 717.456307] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.464277] 1 lock held by syz-executor.0/24146: [ 717.469008] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.476976] 1 lock held by syz-executor.0/24160: [ 717.481716] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.489672] 1 lock held by syz-executor.0/24172: [ 717.494413] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.502383] 1 lock held by syz-executor.3/24180: [ 717.507202] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.515172] 1 lock held by syz-executor.0/24183: [ 717.519914] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.527884] 1 lock held by syz-executor.5/24194: [ 717.532803] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.540783] 1 lock held by syz-executor.0/24203: [ 717.545514] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.553484] 1 lock held by syz-executor.4/24207: [ 717.558217] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.566185] 1 lock held by syz-executor.3/24211: [ 717.570928] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.578884] 1 lock held by syz-executor.0/24243: [ 717.583627] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.591602] 1 lock held by syz-executor.5/24244: [ 717.596334] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.604304] 1 lock held by syz-executor.4/24246: [ 717.609033] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.617001] 1 lock held by syz-executor.1/24272: [ 717.621743] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.629712] 1 lock held by syz-executor.2/24279: [ 717.634452] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.642435] 1 lock held by syz-executor.3/24353: [ 717.647166] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.655141] 1 lock held by syz-executor.0/24373: [ 717.659881] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.667862] 1 lock held by syz-executor.4/24388: [ 717.672606] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.680591] 1 lock held by syz-executor.1/24400: [ 717.685321] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.693291] 1 lock held by syz-executor.2/24401: [ 717.698034] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.706005] 1 lock held by syz-executor.1/24427: [ 717.710750] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.718707] 1 lock held by syz-executor.3/24428: [ 717.723449] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.731416] 1 lock held by syz-executor.0/24431: [ 717.736145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.744123] 1 lock held by syz-executor.3/24462: [ 717.748852] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.756820] 1 lock held by syz-executor.0/24465: [ 717.761996] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.769952] 1 lock held by syz-executor.3/24485: [ 717.774705] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.782685] 1 lock held by syz-executor.4/24507: [ 717.787418] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.795400] 1 lock held by syz-executor.2/24508: [ 717.800143] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.808100] 1 lock held by syz-executor.0/24515: [ 717.812847] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.820818] 1 lock held by syz-executor.4/24543: [ 717.825548] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.833516] 1 lock held by syz-executor.0/24570: [ 717.838246] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.846229] 1 lock held by syz-executor.4/24629: [ 717.850973] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.858930] 1 lock held by syz-executor.2/24632: [ 717.863671] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.871641] 1 lock held by syz-executor.3/24656: [ 717.876372] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.884341] 1 lock held by syz-executor.4/24672: [ 717.889074] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.897073] 1 lock held by syz-executor.5/24704: [ 717.901821] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.909791] 1 lock held by syz-executor.0/24706: [ 717.914534] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.922504] 1 lock held by syz-executor.4/24733: [ 717.927246] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.935227] 1 lock held by syz-executor.3/24737: [ 717.939956] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.947926] 1 lock held by syz-executor.0/24780: [ 717.952672] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.960640] 1 lock held by syz-executor.1/24791: [ 717.965370] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.973340] 1 lock held by syz-executor.4/24796: [ 717.978070] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.986047] 1 lock held by syz-executor.3/24799: [ 717.991348] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 717.999316] 1 lock held by syz-executor.0/24827: [ 718.004063] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.012039] 1 lock held by syz-executor.4/24831: [ 718.016771] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.024741] 1 lock held by syz-executor.5/24832: [ 718.029471] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.037440] 1 lock held by syz-executor.2/24837: [ 718.042183] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.050156] 1 lock held by syz-executor.2/24869: [ 718.054887] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.062856] 1 lock held by syz-executor.5/24871: [ 718.067588] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.075564] 1 lock held by syz-executor.0/24893: [ 718.080307] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.088264] 1 lock held by syz-executor.2/24901: [ 718.093006] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.100976] 1 lock held by syz-executor.5/24902: [ 718.105706] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.113675] 1 lock held by syz-executor.4/24924: [ 718.118417] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.126386] 1 lock held by syz-executor.0/24945: [ 718.131142] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.139103] 1 lock held by syz-executor.5/24946: [ 718.143855] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.151827] 1 lock held by syz-executor.5/24979: [ 718.156557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.164528] 1 lock held by syz-executor.0/24983: [ 718.169258] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.177237] 1 lock held by syz-executor.3/24993: [ 718.181978] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.190053] 1 lock held by syz-executor.1/25031: [ 718.194791] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.202795] 1 lock held by syz-executor.5/25054: [ 718.207525] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.215507] 1 lock held by syz-executor.2/25061: [ 718.220262] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.228218] 1 lock held by syz-executor.5/25097: [ 718.232961] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.240928] 1 lock held by syz-executor.0/25099: [ 718.245756] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.253725] 1 lock held by syz-executor.0/25130: [ 718.258457] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.266428] 1 lock held by syz-executor.5/25134: [ 718.271168] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.279124] 1 lock held by syz-executor.1/25141: [ 718.283866] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.291838] 1 lock held by syz-executor.5/25169: [ 718.296566] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.304538] 1 lock held by syz-executor.3/25170: [ 718.309283] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.317270] 1 lock held by syz-executor.5/25199: [ 718.322025] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.329988] 1 lock held by syz-executor.4/25226: [ 718.334735] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.342702] 1 lock held by syz-executor.0/25265: [ 718.347433] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.355400] 1 lock held by syz-executor.5/25267: [ 718.360145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.368101] 1 lock held by syz-executor.2/25306: [ 718.372845] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.380829] 1 lock held by syz-executor.0/25309: [ 718.385557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.393531] 1 lock held by syz-executor.3/25322: [ 718.398262] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.406234] 1 lock held by syz-executor.1/25336: [ 718.410976] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.418934] 1 lock held by syz-executor.0/25352: [ 718.423687] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.431670] 1 lock held by syz-executor.3/25363: [ 718.436402] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.444370] 1 lock held by syz-executor.2/25387: [ 718.449100] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.457073] 1 lock held by syz-executor.4/25395: [ 718.461828] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.469785] 1 lock held by syz-executor.0/25423: [ 718.474526] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.482496] 1 lock held by syz-executor.4/25426: [ 718.487227] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.495196] 1 lock held by syz-executor.2/25428: [ 718.499924] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.507993] 1 lock held by syz-executor.4/25449: [ 718.512736] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.520704] 1 lock held by syz-executor.0/25453: [ 718.525434] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.533404] 1 lock held by syz-executor.2/25466: [ 718.538132] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.546103] 1 lock held by syz-executor.4/25482: [ 718.550846] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.558802] 1 lock held by syz-executor.0/25484: [ 718.563542] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.571516] 1 lock held by syz-executor.1/25495: [ 718.576248] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.584218] 1 lock held by syz-executor.5/25496: [ 718.588947] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.596917] 1 lock held by syz-executor.4/25524: [ 718.601660] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.609618] 1 lock held by syz-executor.4/25589: [ 718.614360] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.622341] 1 lock held by syz-executor.2/25592: [ 718.627071] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.635046] 1 lock held by syz-executor.5/25595: [ 718.639776] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.647743] 1 lock held by syz-executor.5/25631: [ 718.652486] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.660454] 1 lock held by syz-executor.4/25663: [ 718.665184] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.673156] 1 lock held by syz-executor.0/25673: [ 718.677888] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.685856] 1 lock held by syz-executor.2/25689: [ 718.690601] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.698561] 1 lock held by syz-executor.5/25697: [ 718.703302] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.711272] 1 lock held by syz-executor.2/25729: [ 718.716089] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.724062] 1 lock held by syz-executor.4/25778: [ 718.728791] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.736763] 1 lock held by syz-executor.0/25797: [ 718.741505] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.749464] 1 lock held by syz-executor.4/25801: [ 718.754206] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.762177] 1 lock held by syz-executor.2/25831: [ 718.766908] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.774877] 1 lock held by syz-executor.5/25832: [ 718.779611] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.787578] 1 lock held by syz-executor.2/25862: [ 718.792320] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.800289] 1 lock held by syz-executor.5/25864: [ 718.805039] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.813024] 1 lock held by syz-executor.3/25865: [ 718.817755] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.826345] 1 lock held by syz-executor.3/25888: [ 718.831093] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.839056] 1 lock held by syz-executor.2/25890: [ 718.843806] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.851790] 1 lock held by syz-executor.5/25917: [ 718.856522] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.864499] 1 lock held by syz-executor.3/25918: [ 718.869231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.877200] 1 lock held by syz-executor.0/25920: [ 718.881943] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.889900] 1 lock held by syz-executor.5/25947: [ 718.894644] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.902626] 1 lock held by syz-executor.3/25957: [ 718.907357] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.915325] 1 lock held by syz-executor.2/25959: [ 718.920068] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.928033] 1 lock held by syz-executor.0/25997: [ 718.932789] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.940762] 1 lock held by syz-executor.5/26025: [ 718.945492] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.953464] 1 lock held by syz-executor.0/26031: [ 718.958196] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.966163] 1 lock held by syz-executor.3/26047: [ 718.970907] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.978866] 1 lock held by syz-executor.4/26057: [ 718.983612] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 718.991586] 1 lock held by syz-executor.4/26091: [ 718.996320] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.004290] 1 lock held by syz-executor.1/26093: [ 719.009022] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.016994] 1 lock held by syz-executor.4/26118: [ 719.021760] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.029729] 1 lock held by syz-executor.1/26125: [ 719.034472] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.042442] 1 lock held by syz-executor.2/26126: [ 719.047172] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.055147] 1 lock held by syz-executor.4/26145: [ 719.059877] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.067848] 1 lock held by syz-executor.1/26149: [ 719.072589] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.080562] 1 lock held by syz-executor.3/26186: [ 719.085380] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.093350] 1 lock held by syz-executor.3/26215: [ 719.098082] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.106054] 1 lock held by syz-executor.4/26242: [ 719.110796] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.118753] 1 lock held by syz-executor.1/26243: [ 719.123493] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.131468] 1 lock held by syz-executor.3/26248: [ 719.136200] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.144183] 1 lock held by syz-executor.2/26267: [ 719.148914] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.156882] 1 lock held by syz-executor.5/26275: [ 719.161628] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.169586] 1 lock held by syz-executor.0/26295: [ 719.174328] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.182330] 1 lock held by syz-executor.2/26319: [ 719.187061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.195030] 1 lock held by syz-executor.0/26330: [ 719.199761] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.207733] 1 lock held by syz-executor.2/26348: [ 719.212476] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.220449] 1 lock held by syz-executor.3/26357: [ 719.225182] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.233162] 1 lock held by syz-executor.1/26368: [ 719.237891] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.245859] 1 lock held by syz-executor.5/26439: [ 719.250604] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.258560] 1 lock held by syz-executor.3/26440: [ 719.263305] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.271277] 1 lock held by syz-executor.3/26562: [ 719.276005] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.283974] 1 lock held by syz-executor.4/26563: [ 719.288712] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.296679] 1 lock held by syz-executor.4/26584: [ 719.301421] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.309390] 1 lock held by syz-executor.5/26593: [ 719.314135] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.322105] 1 lock held by syz-executor.4/26683: [ 719.326834] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.334802] 1 lock held by syz-executor.3/26684: [ 719.339534] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.347509] 1 lock held by syz-executor.3/26712: [ 719.352252] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.360223] 1 lock held by syz-executor.5/26715: [ 719.364953] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.372928] 1 lock held by syz-executor.5/26743: [ 719.377670] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.385641] 1 lock held by syz-executor.5/26768: [ 719.390384] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.398342] 1 lock held by syz-executor.1/26774: [ 719.403095] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.411067] 1 lock held by syz-executor.5/26799: [ 719.415798] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.423767] 1 lock held by syz-executor.5/26821: [ 719.428501] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.436470] 1 lock held by syz-executor.1/26822: [ 719.441231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.449190] 1 lock held by syz-executor.4/26823: [ 719.453932] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.461907] 1 lock held by syz-executor.1/26848: [ 719.466636] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.474605] 1 lock held by syz-executor.4/26870: [ 719.479335] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.487305] 1 lock held by syz-executor.3/26882: [ 719.492046] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.500020] 1 lock held by syz-executor.5/26908: [ 719.504751] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.512720] 1 lock held by syz-executor.4/26909: [ 719.517449] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.525419] 1 lock held by syz-executor.3/26925: [ 719.530172] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.538128] 1 lock held by syz-executor.1/26934: [ 719.542871] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.550843] 1 lock held by syz-executor.4/26959: [ 719.555572] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.563554] 1 lock held by syz-executor.4/26988: [ 719.568283] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.576252] 1 lock held by syz-executor.1/27017: [ 719.580994] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.588957] 1 lock held by syz-executor.4/27048: [ 719.593700] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.601669] 1 lock held by syz-executor.1/27074: [ 719.606398] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.614371] 1 lock held by syz-executor.4/27080: [ 719.619101] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.627071] 1 lock held by syz-executor.3/27175: [ 719.631814] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.639769] 1 lock held by syz-executor.4/27204: [ 719.644513] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.652487] 1 lock held by syz-executor.5/27209: [ 719.657217] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.665184] 1 lock held by syz-executor.1/27210: [ 719.669916] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.677889] 1 lock held by syz-executor.3/27211: [ 719.682644] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.690625] 1 lock held by syz-executor.5/27240: [ 719.695355] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.703334] 1 lock held by syz-executor.3/27251: [ 719.708064] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.716037] 1 lock held by syz-executor.5/27298: [ 719.720781] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.728739] 1 lock held by syz-executor.5/27367: [ 719.733484] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.741453] 1 lock held by syz-executor.3/27439: [ 719.746189] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.757371] 1 lock held by syz-executor.5/27441: [ 719.762111] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.770079] 1 lock held by syz-executor.4/27455: [ 719.774812] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.782780] 1 lock held by syz-executor.0/27460: [ 719.787509] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.795481] 1 lock held by syz-executor.3/27464: [ 719.800223] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.808181] 1 lock held by syz-executor.5/27465: [ 719.812923] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.820913] 1 lock held by syz-executor.1/27503: [ 719.825650] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.833620] 1 lock held by syz-executor.4/27533: [ 719.838349] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.846317] 1 lock held by syz-executor.0/27585: [ 719.851060] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.859019] 1 lock held by syz-executor.3/27667: [ 719.863762] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.871729] 1 lock held by syz-executor.1/27668: [ 719.876461] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.884429] 1 lock held by syz-executor.5/27670: [ 719.889164] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.897133] 1 lock held by syz-executor.2/27691: [ 719.901876] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.909863] 1 lock held by syz-executor.3/27694: [ 719.914608] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.922578] 1 lock held by syz-executor.5/27705: [ 719.927307] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.935277] 1 lock held by syz-executor.0/27745: [ 719.940020] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.948065] 1 lock held by syz-executor.5/27747: [ 719.952804] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.960773] 1 lock held by syz-executor.4/27748: [ 719.965505] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.973485] 1 lock held by syz-executor.5/27769: [ 719.978231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.986199] 1 lock held by syz-executor.4/27776: [ 719.991445] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 719.999412] 1 lock held by syz-executor.4/27800: [ 720.004159] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.012130] 1 lock held by syz-executor.3/27801: [ 720.016862] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.024838] 1 lock held by syz-executor.3/27831: [ 720.029567] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.037538] 1 lock held by syz-executor.0/27833: [ 720.042280] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.050249] 1 lock held by syz-executor.4/27850: [ 720.054982] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.062954] 1 lock held by syz-executor.4/27879: [ 720.067684] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.075654] 1 lock held by syz-executor.3/27883: [ 720.080409] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.088378] 1 lock held by syz-executor.2/27885: [ 720.093218] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.101187] 1 lock held by syz-executor.0/27902: [ 720.105922] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.113890] 1 lock held by syz-executor.5/27908: [ 720.118625] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.126598] 1 lock held by syz-executor.5/27948: [ 720.131339] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.139295] 1 lock held by syz-executor.4/27955: [ 720.144037] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.152008] 1 lock held by syz-executor.3/27956: [ 720.156737] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.164709] 1 lock held by syz-executor.5/27972: [ 720.169441] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.177423] 1 lock held by syz-executor.5/28000: [ 720.182164] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.190134] 1 lock held by syz-executor.4/28041: [ 720.194866] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.202846] 1 lock held by syz-executor.2/28072: [ 720.207577] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.215551] 1 lock held by syz-executor.5/28084: [ 720.220295] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.228254] 1 lock held by syz-executor.5/28104: [ 720.232998] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.240971] 1 lock held by syz-executor.2/28150: [ 720.245703] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.253675] 1 lock held by syz-executor.2/28159: [ 720.258414] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.266396] 1 lock held by syz-executor.5/28169: [ 720.271145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.279104] 1 lock held by syz-executor.2/28173: [ 720.283847] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.291830] 1 lock held by syz-executor.4/28174: [ 720.296557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.304527] 1 lock held by syz-executor.5/28192: [ 720.309347] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.317317] 1 lock held by syz-executor.2/28195: [ 720.322062] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.330035] 1 lock held by syz-executor.5/28210: [ 720.334765] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.342741] 1 lock held by syz-executor.2/28227: [ 720.347470] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.355444] 1 lock held by syz-executor.3/28248: [ 720.360201] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.368158] 1 lock held by syz-executor.2/28249: [ 720.372906] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.380877] 1 lock held by syz-executor.0/28253: [ 720.385616] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.393608] 1 lock held by syz-executor.2/28269: [ 720.398356] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.406346] 1 lock held by syz-executor.3/28270: [ 720.411090] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.419047] 1 lock held by syz-executor.2/28291: [ 720.423792] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.431765] 1 lock held by syz-executor.0/28292: [ 720.436495] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.444467] 1 lock held by syz-executor.4/28293: [ 720.449199] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.457170] 1 lock held by syz-executor.4/28311: [ 720.461915] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.469872] 1 lock held by syz-executor.0/28333: [ 720.474634] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.482607] 1 lock held by syz-executor.5/28337: [ 720.487338] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.495310] 1 lock held by syz-executor.0/28348: [ 720.500061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.508022] 1 lock held by syz-executor.5/28395: [ 720.512768] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.520738] 1 lock held by syz-executor.5/28407: [ 720.525467] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.533449] 1 lock held by syz-executor.3/28414: [ 720.538180] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.546159] 1 lock held by syz-executor.2/28416: [ 720.550902] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.558861] 1 lock held by syz-executor.5/28446: [ 720.563625] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.571612] 1 lock held by syz-executor.3/28449: [ 720.576430] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.584487] 1 lock held by syz-executor.3/28466: [ 720.589228] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.597198] 1 lock held by syz-executor.5/28490: [ 720.601943] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.609899] 1 lock held by syz-executor.3/28510: [ 720.614641] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.622613] 1 lock held by syz-executor.5/28512: [ 720.627343] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.635316] 1 lock held by syz-executor.3/28523: [ 720.640058] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.648015] 1 lock held by syz-executor.5/28531: [ 720.652757] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.660739] 1 lock held by syz-executor.3/28534: [ 720.665467] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.673436] 1 lock held by syz-executor.3/28548: [ 720.678169] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.686138] 1 lock held by syz-executor.3/28569: [ 720.690968] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.698927] 1 lock held by syz-executor.2/28571: [ 720.703669] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.711638] 1 lock held by syz-executor.0/28572: [ 720.716367] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.724342] 1 lock held by syz-executor.3/28595: [ 720.729072] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.737142] 1 lock held by syz-executor.0/28597: [ 720.741884] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.749859] 1 lock held by syz-executor.0/28617: [ 720.754689] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.762677] 1 lock held by syz-executor.2/28630: [ 720.767405] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.775378] 1 lock held by syz-executor.0/28650: [ 720.780120] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.788076] 1 lock held by syz-executor.2/28651: [ 720.792818] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.800795] 1 lock held by syz-executor.2/28688: [ 720.805523] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.813494] 1 lock held by syz-executor.5/28707: [ 720.818225] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.826717] 1 lock held by syz-executor.2/28729: [ 720.831466] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.839430] 1 lock held by syz-executor.3/28734: [ 720.844174] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.852144] 1 lock held by syz-executor.3/28760: [ 720.856888] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.864862] 1 lock held by syz-executor.2/28766: [ 720.869593] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.877563] 1 lock held by syz-executor.3/28785: [ 720.882304] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.890276] 1 lock held by syz-executor.2/28787: [ 720.895010] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.902981] 1 lock held by syz-executor.0/28790: [ 720.907711] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.915680] 1 lock held by syz-executor.4/28791: [ 720.920434] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.928389] 1 lock held by syz-executor.2/28799: [ 720.933134] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.941100] 1 lock held by syz-executor.2/28830: [ 720.945831] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.953805] 1 lock held by syz-executor.4/28835: [ 720.958542] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.966509] 1 lock held by syz-executor.5/28836: [ 720.971251] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.979206] 1 lock held by syz-executor.0/28837: [ 720.983949] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 720.991917] 1 lock held by syz-executor.5/28853: [ 720.996645] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.004613] 1 lock held by syz-executor.0/28873: [ 721.009342] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.017314] 1 lock held by syz-executor.5/28874: [ 721.022057] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.030030] 1 lock held by syz-executor.0/28898: [ 721.034758] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.042726] 1 lock held by syz-executor.3/28899: [ 721.047455] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.055422] 1 lock held by syz-executor.4/28903: [ 721.060179] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.068135] 1 lock held by syz-executor.2/28906: [ 721.072892] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.080865] 1 lock held by syz-executor.5/28907: [ 721.085596] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.093568] 1 lock held by syz-executor.2/28957: [ 721.098298] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.106287] 1 lock held by syz-executor.4/28958: [ 721.111028] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.118986] 1 lock held by syz-executor.0/28959: [ 721.123729] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.131823] 1 lock held by syz-executor.0/28980: [ 721.136555] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.144521] 1 lock held by syz-executor.2/28982: [ 721.149255] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.157224] 1 lock held by syz-executor.4/28991: [ 721.161975] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.170034] 1 lock held by syz-executor.2/29000: [ 721.174762] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.182731] 1 lock held by syz-executor.3/29019: [ 721.187460] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.195430] 1 lock held by syz-executor.4/29038: [ 721.200173] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.208127] 1 lock held by syz-executor.4/29057: [ 721.212871] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.220844] 1 lock held by syz-executor.4/29068: [ 721.225575] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.233541] 1 lock held by syz-executor.5/29071: [ 721.238269] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.246236] 1 lock held by syz-executor.4/29083: [ 721.250977] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.258935] 1 lock held by syz-executor.4/29094: [ 721.263675] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.271642] 1 lock held by syz-executor.0/29117: [ 721.276371] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.284346] 1 lock held by syz-executor.4/29118: [ 721.289075] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.297044] 1 lock held by syz-executor.4/29135: [ 721.301784] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.309749] 1 lock held by syz-executor.4/29151: [ 721.314492] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.322464] 1 lock held by syz-executor.4/29169: [ 721.327192] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.335160] 1 lock held by syz-executor.2/29178: [ 721.339889] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.347859] 1 lock held by syz-executor.4/29200: [ 721.352602] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.360571] 1 lock held by syz-executor.3/29205: [ 721.365304] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.373275] 1 lock held by syz-executor.2/29210: [ 721.378005] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.385973] 1 lock held by syz-executor.3/29223: [ 721.390722] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.398675] 1 lock held by syz-executor.2/29227: [ 721.403416] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.411389] 1 lock held by syz-executor.2/29251: [ 721.416118] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.424086] 1 lock held by syz-executor.5/29252: [ 721.428818] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.436799] 1 lock held by syz-executor.3/29254: [ 721.441544] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.449502] 1 lock held by syz-executor.2/29277: [ 721.454242] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.462209] 1 lock held by syz-executor.3/29280: [ 721.466939] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.474908] 1 lock held by syz-executor.5/29282: [ 721.479636] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.487608] 1 lock held by syz-executor.0/29287: [ 721.492349] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.500323] 1 lock held by syz-executor.5/29313: [ 721.505053] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.513021] 1 lock held by syz-executor.0/29317: [ 721.517749] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.525723] 1 lock held by syz-executor.3/29318: [ 721.530466] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.538424] 1 lock held by syz-executor.2/29337: [ 721.543164] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.551134] 1 lock held by syz-executor.5/29345: [ 721.555864] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.563835] 1 lock held by syz-executor.5/29361: [ 721.568563] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.576529] 1 lock held by syz-executor.5/29383: [ 721.581271] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.589229] 1 lock held by syz-executor.3/29401: [ 721.593972] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.601940] 1 lock held by syz-executor.4/29421: [ 721.606788] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.614758] 1 lock held by syz-executor.4/29439: [ 721.619494] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.627466] 1 lock held by syz-executor.2/29440: [ 721.632208] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.640175] 1 lock held by syz-executor.5/29453: [ 721.644902] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.652870] 1 lock held by syz-executor.0/29457: [ 721.657601] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.665579] 1 lock held by syz-executor.2/29469: [ 721.670330] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.678285] 1 lock held by syz-executor.4/29491: [ 721.683032] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.690998] 1 lock held by syz-executor.0/29492: [ 721.695830] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.703801] 1 lock held by syz-executor.2/29510: [ 721.708528] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.716498] 1 lock held by syz-executor.3/29531: [ 721.721238] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.729199] 1 lock held by syz-executor.2/29534: [ 721.733955] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.741926] 1 lock held by syz-executor.3/29580: [ 721.746653] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.754620] 1 lock held by syz-executor.3/29588: [ 721.759348] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.767316] 1 lock held by syz-executor.4/29610: [ 721.772058] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.780030] 1 lock held by syz-executor.2/29611: [ 721.784757] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.792732] 1 lock held by syz-executor.2/29628: [ 721.797460] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.805425] 1 lock held by syz-executor.0/29641: [ 721.810179] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.818153] 1 lock held by syz-executor.3/29672: [ 721.822893] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.830858] 1 lock held by syz-executor.2/29678: [ 721.835595] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.843561] 1 lock held by syz-executor.0/29701: [ 721.848291] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.856266] 1 lock held by syz-executor.2/29719: [ 721.861007] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.868971] 1 lock held by syz-executor.4/29731: [ 721.873712] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.881680] 1 lock held by syz-executor.4/29759: [ 721.886411] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.894468] 1 lock held by syz-executor.2/29782: [ 721.899195] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.907161] 1 lock held by syz-executor.4/29783: [ 721.911903] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.919859] 1 lock held by syz-executor.3/29788: [ 721.924597] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.932562] 1 lock held by syz-executor.3/29820: [ 721.937300] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.945272] 1 lock held by syz-executor.2/29866: [ 721.949998] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.957968] 1 lock held by syz-executor.4/29881: [ 721.962707] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.970675] 1 lock held by syz-executor.3/29904: [ 721.975404] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.983382] 1 lock held by syz-executor.0/29943: [ 721.988619] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 721.996620] 1 lock held by syz-executor.3/29948: [ 722.001360] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.009318] 1 lock held by syz-executor.4/29982: [ 722.014060] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.022029] 1 lock held by syz-executor.4/30016: [ 722.026762] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.034749] 1 lock held by syz-executor.2/30023: [ 722.039489] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.047454] 1 lock held by syz-executor.4/30029: [ 722.052196] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.060161] 1 lock held by syz-executor.4/30042: [ 722.064888] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.072855] 1 lock held by syz-executor.4/30055: [ 722.077582] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.085549] 1 lock held by syz-executor.3/30061: [ 722.090306] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.098262] 1 lock held by syz-executor.0/30067: [ 722.103002] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.110971] 1 lock held by syz-executor.5/30080: [ 722.115701] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.123675] 1 lock held by syz-executor.5/30096: [ 722.128406] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.136373] 1 lock held by syz-executor.4/30099: [ 722.141114] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.149067] 1 lock held by syz-executor.0/30102: [ 722.153815] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.161784] 1 lock held by syz-executor.5/30120: [ 722.166512] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.174476] 1 lock held by syz-executor.2/30126: [ 722.179203] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.187169] 1 lock held by syz-executor.3/30134: [ 722.191907] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.199861] 1 lock held by syz-executor.0/30152: [ 722.204603] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.212579] 1 lock held by syz-executor.4/30178: [ 722.217310] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.225280] 1 lock held by syz-executor.5/30182: [ 722.230022] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.237975] 1 lock held by syz-executor.3/30183: [ 722.242713] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.250687] 1 lock held by syz-executor.0/30184: [ 722.255414] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.263642] 1 lock held by syz-executor.2/30186: [ 722.268371] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.276344] 1 lock held by syz-executor.4/30217: [ 722.281083] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.289125] 1 lock held by syz-executor.0/30220: [ 722.293866] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.301832] 1 lock held by syz-executor.3/30221: [ 722.306562] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.314529] 1 lock held by syz-executor.5/30224: [ 722.319255] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.327221] 1 lock held by syz-executor.4/30251: [ 722.331963] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.339917] 1 lock held by syz-executor.0/30273: [ 722.344655] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.352624] 1 lock held by syz-executor.0/30311: [ 722.357353] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.365320] 1 lock held by syz-executor.3/30336: [ 722.370061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.378027] 1 lock held by syz-executor.4/30354: [ 722.382769] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.390742] 1 lock held by syz-executor.4/30387: [ 722.395474] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.403441] 1 lock held by syz-executor.3/30389: [ 722.408169] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.416137] 1 lock held by syz-executor.4/30416: [ 722.420876] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.428828] 1 lock held by syz-executor.3/30436: [ 722.433577] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.441544] 1 lock held by syz-executor.5/30442: [ 722.446271] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.454240] 1 lock held by syz-executor.4/30450: [ 722.458975] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.466942] 1 lock held by syz-executor.0/30466: [ 722.471684] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.479655] 1 lock held by syz-executor.3/30478: [ 722.484398] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.492367] 1 lock held by syz-executor.3/30508: [ 722.497095] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.505061] 1 lock held by syz-executor.3/30535: [ 722.509800] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.517765] 1 lock held by syz-executor.3/30557: [ 722.522504] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.530472] 1 lock held by syz-executor.1/30568: [ 722.535199] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.543173] 1 lock held by syz-executor.5/30573: [ 722.548029] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.555999] 1 lock held by syz-executor.3/30581: [ 722.560737] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.568701] 1 lock held by syz-executor.5/30590: [ 722.573442] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.581411] 1 lock held by syz-executor.3/30601: [ 722.586139] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.594108] 1 lock held by syz-executor.5/30621: [ 722.598835] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.606800] 1 lock held by syz-executor.0/30640: [ 722.611550] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.619504] 1 lock held by syz-executor.5/30672: [ 722.624244] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.632213] 1 lock held by syz-executor.3/30704: [ 722.636941] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.644920] 1 lock held by syz-executor.5/30712: [ 722.649648] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.657616] 1 lock held by syz-executor.3/30735: [ 722.662355] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.670323] 1 lock held by syz-executor.3/30757: [ 722.675051] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.683018] 1 lock held by syz-executor.5/30771: [ 722.687762] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.695730] 1 lock held by syz-executor.3/30796: [ 722.700472] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.708432] 1 lock held by syz-executor.5/30798: [ 722.713174] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.721144] 1 lock held by syz-executor.5/30883: [ 722.725870] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.733835] 1 lock held by syz-executor.2/30908: [ 722.738564] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.746530] 1 lock held by syz-executor.3/30909: [ 722.751380] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.759337] 1 lock held by syz-executor.4/30982: [ 722.764089] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.772059] 1 lock held by syz-executor.1/30993: [ 722.776786] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.784753] 1 lock held by syz-executor.1/31003: [ 722.789481] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.797458] 1 lock held by syz-executor.0/31039: [ 722.802203] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.810170] 1 lock held by syz-executor.2/31040: [ 722.814903] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.823506] 1 lock held by syz-executor.2/31049: [ 722.828237] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.836217] 1 lock held by syz-executor.0/31057: [ 722.840963] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.848921] 1 lock held by syz-executor.2/31062: [ 722.853661] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.861636] 1 lock held by syz-executor.0/31078: [ 722.866365] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.874335] 1 lock held by syz-executor.2/31086: [ 722.879061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.887042] 1 lock held by syz-executor.4/31093: [ 722.891784] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.899740] 1 lock held by syz-executor.5/31102: [ 722.904480] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.912458] 1 lock held by syz-executor.0/31114: [ 722.917189] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.925158] 1 lock held by syz-executor.1/31157: [ 722.929887] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.937852] 1 lock held by syz-executor.3/31170: [ 722.942593] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.950561] 1 lock held by syz-executor.3/31227: [ 722.955293] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.963262] 1 lock held by syz-executor.3/31318: [ 722.968000] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.975967] 1 lock held by syz-executor.1/31321: [ 722.980709] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 722.988669] 1 lock held by syz-executor.2/31355: [ 722.993409] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.001384] 1 lock held by syz-executor.2/31388: [ 723.006111] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.014087] 1 lock held by syz-executor.5/31396: [ 723.018813] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.026780] 1 lock held by syz-executor.1/31420: [ 723.031519] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.039496] 1 lock held by syz-executor.3/31428: [ 723.044236] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.052205] 1 lock held by syz-executor.3/31462: [ 723.056936] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.064903] 1 lock held by syz-executor.1/31466: [ 723.069629] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.077612] 1 lock held by syz-executor.1/31511: [ 723.082354] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.090320] 1 lock held by syz-executor.5/31527: [ 723.095051] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.103017] 1 lock held by syz-executor.5/31552: [ 723.107746] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.115710] 1 lock held by syz-executor.1/31554: [ 723.120455] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.128497] 1 lock held by syz-executor.1/31598: [ 723.133235] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.141201] 1 lock held by syz-executor.1/31630: [ 723.145928] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.153895] 1 lock held by syz-executor.1/31666: [ 723.158625] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.166687] 1 lock held by syz-executor.3/31671: [ 723.171428] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.179382] 1 lock held by syz-executor.5/31706: [ 723.184131] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.192098] 1 lock held by syz-executor.5/31730: [ 723.196824] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.204791] 1 lock held by syz-executor.1/31793: [ 723.209519] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.217486] 1 lock held by syz-executor.3/31824: [ 723.222225] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.230193] 1 lock held by syz-executor.3/31844: [ 723.234923] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.242890] 1 lock held by syz-executor.4/31872: [ 723.247617] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.255601] 1 lock held by syz-executor.4/31887: [ 723.260351] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.268305] 1 lock held by syz-executor.3/31890: [ 723.273046] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.281013] 1 lock held by syz-executor.5/31908: [ 723.285742] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.293707] 1 lock held by syz-executor.4/31911: [ 723.298434] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.306401] 1 lock held by syz-executor.5/31957: [ 723.311139] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.319098] 1 lock held by syz-executor.3/31958: [ 723.323838] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.331805] 1 lock held by syz-executor.4/31980: [ 723.336533] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.344501] 1 lock held by syz-executor.5/31984: [ 723.349231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.357197] 1 lock held by syz-executor.5/32023: [ 723.361953] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.369908] 1 lock held by syz-executor.5/32057: [ 723.374655] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.382630] 1 lock held by syz-executor.4/32074: [ 723.387415] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.395556] 1 lock held by syz-executor.3/32087: [ 723.400297] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.413186] 1 lock held by syz-executor.4/32108: [ 723.417915] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.425895] 1 lock held by syz-executor.3/32117: [ 723.430642] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.438597] 1 lock held by syz-executor.3/32156: [ 723.443345] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.451313] 1 lock held by syz-executor.3/32174: [ 723.456041] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.464007] 1 lock held by syz-executor.4/32192: [ 723.468735] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.476702] 1 lock held by syz-executor.5/32232: [ 723.481442] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.489405] 1 lock held by syz-executor.4/32242: [ 723.494150] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.502115] 1 lock held by syz-executor.5/32251: [ 723.506849] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.514830] 1 lock held by syz-executor.4/32259: [ 723.519558] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.527527] 1 lock held by syz-executor.3/32271: [ 723.532355] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.540336] 1 lock held by syz-executor.5/32276: [ 723.545064] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.553030] 1 lock held by syz-executor.4/32291: [ 723.557755] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.565722] 1 lock held by syz-executor.5/32310: [ 723.570465] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.578419] 1 lock held by syz-executor.4/32333: [ 723.583161] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.591131] 1 lock held by syz-executor.3/32369: [ 723.595859] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.603825] 1 lock held by syz-executor.4/32371: [ 723.608550] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.616612] 1 lock held by syz-executor.5/32373: [ 723.621355] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.629307] 1 lock held by syz-executor.5/32394: [ 723.634061] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.642029] 1 lock held by syz-executor.5/32413: [ 723.646756] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.654723] 1 lock held by syz-executor.5/32423: [ 723.659462] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.667430] 1 lock held by syz-executor.4/32475: [ 723.672168] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.680143] 1 lock held by syz-executor.5/32507: [ 723.684871] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.692838] 1 lock held by syz-executor.4/32527: [ 723.697569] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.705542] 1 lock held by syz-executor.5/32530: [ 723.710280] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.718232] 1 lock held by syz-executor.4/32554: [ 723.722973] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.731026] 1 lock held by syz-executor.4/32567: [ 723.735752] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.743724] 1 lock held by syz-executor.5/32585: [ 723.748453] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.756419] 1 lock held by syz-executor.4/32587: [ 723.761159] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.769127] 1 lock held by syz-executor.4/32622: [ 723.773866] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.781833] 1 lock held by syz-executor.3/32630: [ 723.786559] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.794531] 1 lock held by syz-executor.5/32652: [ 723.799267] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.807234] 1 lock held by syz-executor.4/32660: [ 723.811972] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.819925] 1 lock held by syz-executor.3/32667: [ 723.824665] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.832637] 1 lock held by syz-executor.5/32679: [ 723.837369] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.845338] 1 lock held by syz-executor.1/32733: [ 723.850080] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.858039] 1 lock held by syz-executor.5/32735: [ 723.862780] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.870750] 1 lock held by syz-executor.1/32764: [ 723.875479] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.883449] 1 lock held by syz-executor.1/334: [ 723.888008] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.895981] 1 lock held by syz-executor.1/369: [ 723.900549] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.908519] 1 lock held by syz-executor.1/383: [ 723.913086] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.921061] 1 lock held by syz-executor.1/415: [ 723.925618] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.933590] 1 lock held by syz-executor.5/438: [ 723.938144] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.946114] 1 lock held by syz-executor.1/458: [ 723.950680] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.958633] 1 lock held by syz-executor.5/464: [ 723.963208] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.971173] 1 lock held by syz-executor.1/494: [ 723.975751] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.983718] 1 lock held by syz-executor.3/525: [ 723.988798] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 723.996789] 1 lock held by syz-executor.3/618: [ 724.001359] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.009314] 1 lock held by syz-executor.3/634: [ 724.013882] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.021857] 1 lock held by syz-executor.3/689: [ 724.026411] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.034379] 1 lock held by syz-executor.3/707: [ 724.038936] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.046906] 1 lock held by syz-executor.5/710: [ 724.051471] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.059427] 1 lock held by syz-executor.1/740: [ 724.064003] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.071968] 1 lock held by syz-executor.1/775: [ 724.076522] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.084491] 1 lock held by syz-executor.5/783: [ 724.089055] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.097031] 1 lock held by syz-executor.3/823: [ 724.101600] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.109558] 1 lock held by syz-executor.3/918: [ 724.114145] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.122122] 1 lock held by syz-executor.5/919: [ 724.126678] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.134650] 1 lock held by syz-executor.1/923: [ 724.139205] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.147657] 1 lock held by syz-executor.1/950: [ 724.152223] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.160201] 1 lock held by syz-executor.1/960: [ 724.164757] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.172723] 1 lock held by syz-executor.5/976: [ 724.177277] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.185246] 1 lock held by syz-executor.1/998: [ 724.189801] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.197769] 1 lock held by syz-executor.3/1002: [ 724.202423] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.210390] 1 lock held by syz-executor.5/1006: [ 724.215031] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.223000] 1 lock held by syz-executor.3/1035: [ 724.227639] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.235607] 1 lock held by syz-executor.5/1041: [ 724.240261] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.248217] 1 lock held by syz-executor.1/1073: [ 724.252871] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.260838] 1 lock held by syz-executor.1/1131: [ 724.265477] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.273450] 1 lock held by syz-executor.3/1158: [ 724.278096] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.286066] 1 lock held by syz-executor.1/1164: [ 724.290718] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.298672] 1 lock held by syz-executor.5/1200: [ 724.303323] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.311293] 1 lock held by syz-executor.3/1204: [ 724.315935] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.323901] 1 lock held by syz-executor.1/1206: [ 724.328550] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.336528] 1 lock held by syz-executor.3/1226: [ 724.341190] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.349146] 1 lock held by syz-executor.5/1231: [ 724.353800] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.361781] 1 lock held by syz-executor.3/1271: [ 724.366425] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.374393] 1 lock held by syz-executor.5/1319: [ 724.379033] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.387004] 1 lock held by syz-executor.1/1342: [ 724.391658] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.399618] 1 lock held by syz-executor.5/1343: [ 724.404270] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.412238] 1 lock held by syz-executor.3/1352: [ 724.416878] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.424843] 1 lock held by syz-executor.3/1387: [ 724.429485] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.437452] 1 lock held by syz-executor.5/1390: [ 724.442106] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.450074] 1 lock held by syz-executor.1/1398: [ 724.454714] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.462680] 1 lock held by syz-executor.1/1433: [ 724.467320] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.475287] 1 lock held by syz-executor.3/1475: [ 724.479931] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.487899] 1 lock held by syz-executor.1/1495: [ 724.492557] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.500536] 1 lock held by syz-executor.3/1507: [ 724.505180] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.513146] 1 lock held by syz-executor.1/1514: [ 724.517788] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.525756] 1 lock held by syz-executor.3/1551: [ 724.530409] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.538364] 1 lock held by syz-executor.3/1583: [ 724.543019] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.550989] 1 lock held by syz-executor.3/1620: [ 724.555631] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.563597] 1 lock held by syz-executor.1/1625: [ 724.568241] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.576208] 1 lock held by syz-executor.3/1645: [ 724.580860] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.588813] 1 lock held by syz-executor.1/1646: [ 724.593468] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.601437] 1 lock held by syz-executor.3/1662: [ 724.606078] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.614220] 1 lock held by syz-executor.1/1670: [ 724.618860] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.626825] 1 lock held by syz-executor.1/1694: [ 724.631477] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.639432] 1 lock held by syz-executor.3/1705: [ 724.644086] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.652055] 1 lock held by syz-executor.1/1736: [ 724.656696] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.664666] 1 lock held by syz-executor.3/1781: [ 724.669307] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.677273] 1 lock held by syz-executor.5/1874: [ 724.681927] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.689879] 1 lock held by syz-executor.5/1904: [ 724.694538] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.702527] 1 lock held by syz-executor.1/1905: [ 724.707172] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.715137] 1 lock held by syz-executor.3/1945: [ 724.719777] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.727744] 1 lock held by syz-executor.5/1953: [ 724.732398] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.740366] 1 lock held by syz-executor.3/1980: [ 724.745008] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 724.752977] 1 lock held by syz-executor.5/1981: [ 724.757621] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440