@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:26 executing program 1: 22:36:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:27 executing program 3: 22:36:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000100)={0x0, 0x0, 'client0\x00', 0x0, "3c50e9a5ca30df75", "bf809bb6a75ebe60299eb6604cedddd7b7b148114bf812b7c0bfd892ff9d9c8a"}) 22:36:27 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8000080, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000380)={0x9}) 22:36:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getown(r1, 0x9) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) sendmsg$rds(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0xc, {{}, &(0x7f0000000e80), 0x0}}], 0x58}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:36:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:27 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000200)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000b29f57)=@known='security.capability\x00\xc9\xbd0\x12\x98>\x02\x15Y`\x19j*\x84X_\x19\xc1\xc8&\x17)\x82\xa8\xde\x1c\xccL\xdci\x87\xff\xc9q\\\xef\"\xce\xe4\xc6s\xd48\x8d^V\x04\xa0\xb88\xaf\xb3[\xd3R\xe4\xc9\xeed\x9aw\x12\b0\x9c\xa46\xbf\x91\x9f\xd9ck\xfa%_\xf4\xb3\x1f@\xf8\x8e\xcc\x9c-\x81!q\xc4\x12bO\f\x14/\xc5Oe\xf4\x929\xf2v\x86\xc1}H\x9e\x92]\xa1\x9b\xf3\x1e0\xecu\xcd\x92#yWf\x1c\xe8\xa1V\x84\x18\xe6\xd3\xd4(\x17O\x89\xa1\x1c\xc8!\xfb\xf6A\"\xa3okA\x1c', 0x0, 0x0) 22:36:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="2e0000001c008104e00f80ecdb4cb90402c804a002000000980010fb120001000e00da1b40d819a9060015000058", 0x2e}], 0x1}, 0x0) 22:36:27 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000300)={@ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x9) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040), 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000180)=0x8) 22:36:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:28 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000005c0), 0x1000) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0xfdf5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000e90000010000000000000000000b08956d069e000200002066ce654d316e6d446576656d31f6f9ff02000000000000000000c71348a90000000001000000000000002cff000000000000000000000000000000000000000002001c00002100000051a717000418b9b3cc002b737973740400000065746367726f756024dfa1180f4694520737352fe9ce54ad3c0c8575495153d24c092bfea80203b6cbdeaebc72963091f7bd5a85d41b"], 0xbd) 22:36:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getown(r1, 0x9) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) sendmsg$rds(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0xc, {{}, &(0x7f0000000e80), 0x0}}], 0x58}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:36:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:28 executing program 3: r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) recvmsg$kcm(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg(r0, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 22:36:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) [ 552.624718] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. [ 552.633877] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. [ 552.697984] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. 22:36:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) [ 552.748452] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. 22:36:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 552.794169] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. 22:36:28 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55]}}, 0x80, 0x0}, 0x0) [ 552.890932] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. [ 552.900073] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor3'. 22:36:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) futex(&(0x7f000000cffc), 0x0, 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42000) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 22:36:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:29 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\xae\'\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000180)="030300000400600000000000fff5", 0xe, 0x0, 0x0, 0x0) 22:36:29 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc"], 0x1, 0x0, 0x0) 22:36:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = inotify_init() truncate(&(0x7f0000000140)='./file0\x00', 0x8) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x80000002) fallocate(r1, 0x20, 0x0, 0x100000000) 22:36:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="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") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000069c0)={{{@in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000006ac0)=0xe8) getgid() sendmmsg$unix(r1, &(0x7f0000006bc0)=[{&(0x7f0000004f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006500)=[{&(0x7f0000006400)="a9b7f3e515cd6a5f81366bd1b37504ef802faae94b0e14dbd82efb487e5639813e0b34442111745868e4770a7cee08ff01f260df5bb694e4169c733b23dd712e8e24327b9b6c212150f84eda4a60af897bfb216b82361171a13327f5f3a1aec18d4eece3fafeebf612084c3798a4a6ce77b80efa41a93cb8323438e6e40af5f4d74eb32cebeb45fff9334a0f7e473c097b44250ffdd635e778e13bb9be69799359ced958af27dd08eacd190a2fca14e6725ea6d90d9cde319c24d368f16e4c5f9618f868995f338fa3b2c5c74edce405f4653f9768be69f56c5ed8dbe7804996ec19d5ddca", 0xe5}], 0x1, 0x0, 0x0, 0x24040000}], 0x1, 0x40) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x800000000000000, 0x2, 0x1}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a45322, &(0x7f00000008c0)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000480)) accept4$unix(r4, &(0x7f0000000300)=@abs, &(0x7f0000000140)=0x6e, 0x800) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f0000000100)=0x5) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000400)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000640)) lchown(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r7, &(0x7f00000000c0)=0x202, 0x5a) 22:36:29 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d6d71933c93388aad5dd7c6e2911dda7a183b", @ANYPTR]], 0x1, 0x0, 0x0) 22:36:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000001c0)={@mcast1}, 0x14) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 22:36:29 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) sendmsg$rds(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0xc, {{}, 0x0, &(0x7f0000000ec0)}}], 0x58}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0xd803}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:36:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="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") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80000000002, 0x4) recvmmsg(r0, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) 22:36:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:30 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400000000010000000000000000000000197f24acc233ee18e55012acc222bab68a32d5564ca27da60c7f7ab744b23051acb450e4f36965fd09cf82ce02f9e3631ad613a90a477f0b689fca3b38812e778206e512637b5435373356ddd0514c8b7b52d1b374d037f3a2efdde734b12a11fc457b253d1cb732ff8543b0d72fe377adf5326d29fe1421d286beb553f8bb32ad1ffceb89c491f195abf0a41eb43f4c7ac7c81753d8d9ccac9c55f2752103f2073baa94fc7577b1b900009daf2952bd4d3b032ca9695501286eced881003b3896374534403987bc9e67cf8b4978f1a8a9a5b4a28aca6f36abdd8e3fc65c6d4b35db5cb421940801"], 0x1, 0x0, 0x0) 22:36:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="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") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000321000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:36:30 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab"], 0x0) 22:36:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r2, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000200)=@abs, 0x6e) 22:36:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x800007e, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000380)={0x2, @pix={0x0, 0x0, 0x3132564e}}) 22:36:31 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) sendfile(r0, r2, 0x0, 0x8000fffffffe) 22:36:31 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab650000000000000000000000649c7421ed84ba60d5d77990b428d15a000000001000000000000000712316ccca4f6b7ba0627c7ac50511950000"], 0x0) 22:36:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000a40)="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") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r2, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_INPUT(r0, &(0x7f0000004240)={0x8, "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", 0x90f00fa27525af92}, 0xfffffe48) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) getpgrp(0x0) recvfrom$unix(r1, &(0x7f00000001c0)=""/4, 0xfffffffffffffd1a, 0x100100, &(0x7f0000000100)=@abs, 0xfffffffffffffd6b) 22:36:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200)) 22:36:31 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x0) 22:36:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000040)=""/109) 22:36:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:31 executing program 1: 22:36:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000a40)="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") r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r4, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r2, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r4, r5, &(0x7f00000000c0)=0x202, 0x5a) 22:36:32 executing program 1: 22:36:32 executing program 5: 22:36:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:32 executing program 1: 22:36:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:32 executing program 5: 22:36:32 executing program 3: 22:36:32 executing program 5: 22:36:32 executing program 1: 22:36:32 executing program 3: 22:36:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:33 executing program 1: 22:36:33 executing program 3: 22:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:33 executing program 5: 22:36:33 executing program 1: 22:36:33 executing program 5: 22:36:33 executing program 1: 22:36:33 executing program 3: 22:36:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:34 executing program 5: 22:36:34 executing program 1: 22:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000001100)="390000001300090468fe0700000000000000ff3f25000000450001070000001419001a000400020007000a00550e69330f4de5020080080000", 0x39}], 0x1) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) 22:36:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000700)=@nat={'nat\x00', 0x19, 0x4, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x200004bc], 0x0, 0x0, &(0x7f00000001c0)=[{}, {0x2}, {0x0, '\x00', 0x3}]}, 0x108) 22:36:34 executing program 1: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\xae\'\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)="030300000400600000000000fff55b4202938207d9fb3780398d5375000000007929301ee61605c01843e06590080053c0e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff00000000aeb4", 0x6c, 0x0, 0x0, 0x0) 22:36:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 558.501183] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 558.510459] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 558.520186] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. [ 558.541511] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 558.549570] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 558.561485] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 558.571165] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. 22:36:34 executing program 5: msgrcv(0x0, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 22:36:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x402, 0x0) 22:36:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) socketpair$unix(0x1, 0x20000000002, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 22:36:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:35 executing program 5: mknod(&(0x7f0000000140)='./file0\x00', 0x8005, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001840)="247540426411e400aa84601409f7b8b32612e551121d5f4d8179cf40675a527049ba17f4c304e4dc3328877e2d8caa6dd40f5c9a747a9a19045cea7b3d7c4a6451465ad38000e8", 0x47}], 0x1}, 0x400) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 22:36:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:35 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000180012000a000100cf4cd5773acbe137080002003f000000"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:35 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) 22:36:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="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") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:35 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101000002}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="64869c37be72e4fddd7e0ae16087dcf944584574f9f041d50a1a41026809133995c7307a6f0befe73c063d2a309936cfdfd413d0e461033cdea4bc7408773975ab8bc5dd25a0b03b12e3db19cbc725c3efb4ab02656013b752fc94ade664486e82d7dcb4f510dd7841d9"], 0x1, 0x0, 0x0) 22:36:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000180)=0x939, 0x4) sendto$unix(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000400)="01", 0x1) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 22:36:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x205, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000000000000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x8, [0x5, 0xd23, 0x200, 0x6, 0x1, 0x9, 0x0, 0x80]}, &(0x7f0000000180)=0x14) r1 = dup3(0xffffffffffffffff, r0, 0xfffffffffffffffe) clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000004c0)=0x9) exit(0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xcf, &(0x7f00000003c0)=""/168, &(0x7f0000000480)=0xa8) setpriority(0x1, 0x0, 0x140) fchdir(0xffffffffffffffff) 22:36:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:37 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x6a) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file1\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) 22:36:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000001c0)=0x7) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getpeername$netlink(r0, &(0x7f00000002c0), &(0x7f0000000300)=0xc) listxattr(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000600), 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r2) recvfrom(r2, &(0x7f00000006c0)=""/186, 0xba, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000840)) setxattr$security_smack_entry(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) getgid() write$P9_RGETATTR(r1, &(0x7f0000000ac0)={0xa0, 0x19, 0x2, {0x0, {0x52, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x2, 0x76, 0xffff, 0x7, 0x8b, 0x13d3, 0x896, 0x8}}, 0xa0) ioctl$TIOCEXCL(r0, 0x540c) 22:36:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x20, r0, 0x8001, 0x7) 22:36:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB='\b'], 0x1) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) 22:36:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0xa0140100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 22:36:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, 0x0}, 0x550) 22:36:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x3ff, 0x5, 0xa}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000100)={0xa, 0x0, 0x104000ded7, @mcast1, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') r3 = perf_event_open(&(0x7f0000271000)={0x20000000002, 0x70, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getresgid(&(0x7f0000000440), &(0x7f0000000a40), &(0x7f0000000a80)) getpid() fstat(r2, &(0x7f0000000ac0)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getpid() getegid() fstat(r3, &(0x7f0000000200)) r5 = fcntl$getown(r3, 0x9) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getgroups(0x5, &(0x7f0000001440)=[0x0, 0xee01, 0xee01, 0xee00, 0x0]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000002280)) lstat(0x0, &(0x7f0000000300)) fcntl$getownex(r3, 0x10, &(0x7f0000002980)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000000480)=0xfffffffffffffca2) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002b00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, 0x0) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) stat(0x0, &(0x7f0000002dc0)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000002ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@local, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000003000)=0xe8) getresgid(&(0x7f0000000640), &(0x7f00000004c0), &(0x7f0000000540)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003140)=0xc) getresgid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003240)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000003340)=0xe8) getgroups(0x2, &(0x7f0000003380)=[0xffffffffffffffff, 0x0]) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) getresgid(0x0, &(0x7f0000004a80), &(0x7f0000004ac0)) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000004b40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b80)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000004c80)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004e80), 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000004f00)) getuid() getgid() ioctl$TIOCGSID(r2, 0x5429, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005c40)={{{@in, @in=@loopback}}}, &(0x7f0000005d40)=0xe8) getgid() getpgrp(r5) lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) write(r0, &(0x7f0000001680)="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", 0x8f4) 22:36:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0xa0140100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 22:36:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) [ 561.915272] kernel msg: ebtables bug: please report to author: Wrong len argument 22:36:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getpid() r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="4f8c"], 0x2) 22:36:38 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) init_module(&(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0xffdec, &(0x7f0000000100)='ppp0em1cpuset\x00') [ 561.959712] kernel msg: ebtables bug: please report to author: Wrong len argument 22:36:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="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") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x3ff, 0x5, 0xa}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000100)={0xa, 0x0, 0x104000ded7, @mcast1, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') r3 = perf_event_open(&(0x7f0000271000)={0x20000000002, 0x70, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getresgid(&(0x7f0000000440), &(0x7f0000000a40), &(0x7f0000000a80)) getpid() fstat(r2, &(0x7f0000000ac0)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getpid() getegid() fstat(r3, &(0x7f0000000200)) r5 = fcntl$getown(r3, 0x9) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getgroups(0x5, &(0x7f0000001440)=[0x0, 0xee01, 0xee01, 0xee00, 0x0]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000002280)) lstat(0x0, &(0x7f0000000300)) fcntl$getownex(r3, 0x10, &(0x7f0000002980)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000000480)=0xfffffffffffffca2) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002b00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, 0x0) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) stat(0x0, &(0x7f0000002dc0)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000002ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@local, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000003000)=0xe8) getresgid(&(0x7f0000000640), &(0x7f00000004c0), &(0x7f0000000540)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003140)=0xc) getresgid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003240)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000003340)=0xe8) getgroups(0x2, &(0x7f0000003380)=[0xffffffffffffffff, 0x0]) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) getresgid(0x0, &(0x7f0000004a80), &(0x7f0000004ac0)) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000004b40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b80)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000004c80)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004e80), 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000004f00)) getuid() getgid() ioctl$TIOCGSID(r2, 0x5429, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005c40)={{{@in, @in=@loopback}}}, &(0x7f0000005d40)=0xe8) getgid() getpgrp(r5) lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) write(r0, &(0x7f0000001680)="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", 0x8f4) 22:36:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="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") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:38 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) close(r0) 22:36:38 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/wireless\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000340)={&(0x7f00000002c0), 0x8}) clock_gettime(0x1000000007, &(0x7f0000000580)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:36:38 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000f80)=""/197, 0xc5}], 0x1, 0x0, 0x0, 0x7fffffff}}], 0x1, 0x0, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00B\xb3\x90\nF\xff.W\xae\xde\xa0\xa0\x00K\x1a\x10\x16\x10}\"\xe6q\xaf\x12\xdd\x8d\xbe\xaa\xd8#{3]\xe3\xee\x0e\xd2\xc7\xd7\xc1\x7fu\x88\xafQ4\x17\xc2\x90\xa5\xbbZ%\x88\xb9\xa5\xdc,\xa4a\xd7\x9a\x90\xbeP7\xba\xb8\xd4\xc1,\xc9\f\xc8f \x13\xa8\v~\fi\x8co\x10\xacW\xae\x1ep\x1e/0[\xbd\xf1_\x112GJ\xe0\xe6\xeaB\x9a\x1f\xab.\xdbF\x05\x8c\b\x00\x80\x06\xc6[') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:36:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000a40)="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") r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fstat(r0, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r3, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r1, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x202, 0x5a) 22:36:39 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x1ce, 0x0, 0x0, 0x10f}, "5b604512618ca107d3e3635f52fe8e4e76b95f341e551112503611b853473b5c2bc2ca03a8331fc0eb134cec4126dcc4a3d09933dd75bcf6afc988920f54c86c8aee82779e5c2252", [[]]}, 0x168) io_setup(0x18e, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x10001) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 22:36:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:36:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0xa0, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 563.666047] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 563.784630] kernel msg: ebtables bug: please report to author: entry offsets not in right order 22:36:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:40 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000000)={&(0x7f0000002100)=""/4096, 0x1000}) 22:36:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x205, 0x84) openat$dir(0xffffffffffffff9c, 0x0, 0x8000000000000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x8, [0x5, 0xd23, 0x200, 0x6, 0x1, 0x9, 0x0, 0x80]}, &(0x7f0000000180)=0x14) clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000300)="f8f18e3c308d8552bc958d3f953b1b5cd7512e3ca390f332daea", 0x1a, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) exit(0x0) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xcf, &(0x7f00000003c0)=""/168, &(0x7f0000000480)=0xa8) setpriority(0x1, 0x0, 0x140) fchdir(0xffffffffffffffff) 22:36:40 executing program 3: [ 564.094554] ptrace attach of "/root/syz-executor5"[11710] was attempted by "/root/syz-executor5"[22312] 22:36:40 executing program 1: 22:36:40 executing program 3: 22:36:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:40 executing program 5: 22:36:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 564.736657] audit: type=1326 audit(1546641400.782:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22338 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x7fc00000 22:36:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:41 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000380)=""/67, 0x5c78f728127772f2) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) poll(0x0, 0x0, 0xf8) msgrcv(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7ca509f1efff000008000000000000000000000000533b0ffa9ca3"], 0x1, 0x0, 0x0) 22:36:41 executing program 5: 22:36:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(0x0, &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:41 executing program 5: 22:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:41 executing program 1: 22:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:41 executing program 5: 22:36:41 executing program 3: 22:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:42 executing program 1: 22:36:42 executing program 5: 22:36:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), 0x0) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:42 executing program 3: 22:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(0x0, 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:42 executing program 5: 22:36:42 executing program 3: 22:36:42 executing program 1: 22:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(0x0, 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:42 executing program 5: 22:36:43 executing program 1: 22:36:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:43 executing program 5: 22:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(0x0, 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:43 executing program 3: 22:36:43 executing program 1: 22:36:43 executing program 5: 22:36:43 executing program 3: 22:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:43 executing program 3: 22:36:43 executing program 5: 22:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:44 executing program 1: 22:36:44 executing program 3: 22:36:44 executing program 5: 22:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:44 executing program 5: 22:36:44 executing program 1: 22:36:44 executing program 3: 22:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:44 executing program 5: 22:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:44 executing program 1: 22:36:44 executing program 3: 22:36:44 executing program 5: 22:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) 22:36:45 executing program 5: 22:36:45 executing program 3: 22:36:45 executing program 1: 22:36:45 executing program 5: 22:36:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:45 executing program 3: 22:36:45 executing program 1: 22:36:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:45 executing program 5: 22:36:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:45 executing program 3: 22:36:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:46 executing program 1: 22:36:46 executing program 5: 22:36:46 executing program 3: 22:36:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:46 executing program 1: 22:36:46 executing program 5: 22:36:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:46 executing program 3: 22:36:46 executing program 1: 22:36:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:46 executing program 5: 22:36:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:46 executing program 3: 22:36:46 executing program 1: 22:36:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000200)=""/116, 0x184) 22:36:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:47 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501acee453000000000000000000000000000000000800000000000000bd99b039"], 0x0) 22:36:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x9) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x40000000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000200)=0x94b, 0x4) fcntl$addseals(r1, 0x409, 0x4) fcntl$setstatus(r2, 0x4, 0x42000) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000300)) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 22:36:47 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d", @ANYPTR]], 0x1, 0x0, 0x0) 22:36:47 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x3a4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f00000002c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) 22:36:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x1, @ipv4={[], [], @empty}}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x98) 22:36:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 22:36:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0), 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:48 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x10000) 22:36:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:48 executing program 1: r0 = msgget(0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000001340)=""/163) 22:36:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100000000000000, 0x1100, 0xaa, 0x80fe}, 0x80, 0x0}, 0x0) 22:36:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000015c0)) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:48 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab650000000000000000000000649c7421ed84ba60d5d77990b428d15a00000000100000000000000071"], 0x0) 22:36:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8000080, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000380)={0x2, @pix={0x0, 0x0, 0x3132564e}}) 22:36:49 executing program 3: 22:36:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000200007031dfffd946f610500810000000800000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 22:36:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) [ 573.192821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 22:36:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1146, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 22:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:49 executing program 3: r0 = inotify_init() r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 22:36:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:49 executing program 5: socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x48) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="3720b6e670ebd072e737655eb35e6536fe30dce48f796c26f9bb5b"], 0x1b) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000100000, 0x500001c) 22:36:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r1, r2, 0x0, 0x10000) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000580), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000400)=@req3={0x1000, 0x0, 0x80000000, 0x0, 0x7fffffff, 0x1, 0x80000000}, 0x1c) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, 0x0, 0x80) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0x0, @in6}}, 0xe8) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@local, 0x2, 0x2, 0x3, 0x8, 0x0, 0x688}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) 22:36:50 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0}, 0x200008c4) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x616, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 22:36:50 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x804a) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) 22:36:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc53e0ab49282d676a683568600f172c4d0d167917bd7a810ecc22ddfcf63ba3c7f0cf68535adb15c1bc39c7fd3c74025857176be15f83c3f6608b0e17447f9f5c56e8b297e01593ddb2364f78db6c589e"], 0x1, 0x0, 0x0) 22:36:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:50 executing program 3: r0 = creat(&(0x7f0000000140)='./file1\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) close(r0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) socket$unix(0x1, 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) fgetxattr(r0, 0x0, 0x0, 0xffffff98) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="97f52a19da526d0e060b082c70afa587", 0x10) 22:36:50 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 22:36:50 executing program 1: sched_setaffinity(0x0, 0x228, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0xa, @in6, 0x0, 0x1, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x4, @ipv4={[], [], @empty}, 0x6f7}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 22:36:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, &(0x7f0000000280)) pipe(&(0x7f0000004680)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 22:36:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000001640)) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 574.853040] binder: 22765:22768 transaction failed 29189/-22, size 0-0 line 2834 [ 574.907333] binder: 22765:22776 transaction failed 29189/-22, size 0-0 line 2834 [ 574.972111] binder: undelivered TRANSACTION_ERROR: 29189 [ 574.977668] binder: undelivered TRANSACTION_ERROR: 29189 22:36:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:51 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0bd2430f020319", 0x7}], 0x1) 22:36:51 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x804a) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1) read(0xffffffffffffffff, 0x0, 0x205) 22:36:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000200007031dfffd946f610500810000000800000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 22:36:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 22:36:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 575.612949] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 22:36:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc53e0ab49282d676a683568600f172c4d0d167917bd7a810ecc"], 0x1, 0x0, 0x0) 22:36:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x98) 22:36:52 executing program 1: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\xae\'\x00', 0x0}) read(r0, &(0x7f0000000200)=""/211, 0xd3) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000180)="030300000400600000000000fff55b4202938207d9fb3780398d5375000000007929301ee61605c01843e06590080053c0e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff00000000aeb4d3", 0x6d, 0x0, 0x0, 0x0) 22:36:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:52 executing program 3: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100000000000000, 0x1100, 0xaa, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff", 0x28}], 0x1}, 0x0) 22:36:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000001cc0)) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:53 executing program 5: perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) clone(0x1f11f00, 0x0, &(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 22:36:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/packet\x00') preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) 22:36:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) close(r0) 22:36:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:53 executing program 5: 22:36:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) [ 577.389917] input: syz1 as /devices/virtual/input/input5 [ 577.504457] input: syz1 as /devices/virtual/input/input6 22:36:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:53 executing program 1: 22:36:53 executing program 5: 22:36:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:53 executing program 3: 22:36:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:54 executing program 5: 22:36:54 executing program 3: 22:36:54 executing program 1: 22:36:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:54 executing program 3: 22:36:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:54 executing program 1: 22:36:54 executing program 5: 22:36:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:54 executing program 3: 22:36:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r2, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:54 executing program 5: 22:36:54 executing program 1: 22:36:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:55 executing program 3: 22:36:55 executing program 5: 22:36:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(r1, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000004500)) 22:36:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:55 executing program 3: 22:36:55 executing program 1: 22:36:55 executing program 5: 22:36:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) 22:36:55 executing program 5: 22:36:55 executing program 3: 22:36:55 executing program 1: 22:36:56 executing program 3: 22:36:56 executing program 5: 22:36:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004500)) 22:36:56 executing program 1: 22:36:56 executing program 5: 22:36:56 executing program 3: 22:36:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:56 executing program 3: 22:36:56 executing program 1: 22:36:56 executing program 5: 22:36:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000004500)) 22:36:57 executing program 1: 22:36:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:57 executing program 3: 22:36:57 executing program 5: 22:36:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:57 executing program 1: 22:36:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000004500)) 22:36:57 executing program 3: 22:36:57 executing program 1: 22:36:57 executing program 5: 22:36:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004500)) 22:36:57 executing program 3: 22:36:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000", 0x18}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:58 executing program 1: 22:36:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:58 executing program 5: 22:36:58 executing program 3: 22:36:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 22:36:58 executing program 1: 22:36:58 executing program 5: 22:36:58 executing program 3: 22:36:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:58 executing program 5: 22:36:58 executing program 1: 22:36:59 executing program 3: 22:36:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000", 0x18}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:36:59 executing program 5: 22:36:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 22:36:59 executing program 1: 22:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 22:36:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1146, 0x0) close(r0) 22:36:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0}, 0x28) 22:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:36:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syncfs(r0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0xfffa, 0x0) 22:36:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x10) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat(r1, 0x0, 0x128) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000340)=0x2, 0x4) lsetxattr$security_ima(&(0x7f0000000200)='./bus\x00', &(0x7f0000000480)='security.ima\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="0411fb2e12f10728f15a5f95f553b47b678aaaa716b9ba16c46991431bd4ecd6553704005e7bc7e6363b3d82453209dc5834d13a5c2608171eafe718cd333dc13b83f615ccff7f9a8db7a1a912b70ff301892625bea36b7dafbc7a7fffffffb8e520a97205cb78ffff792f1e072b3153e7a065335221bb5d8531f9a641bf4851c7a10729541e05dc67bb82f9ffff2760dce1b3004b3684ea1d435989d510afc312ce55cb476a72c99afe622d5c462206dbdbafbb7b5011b18ff3d9a3f1b93ca2198ec47821975b5a92579eecdf8eec3547d9abf8fef1d42800000000000000000000000000000000ac93b81f4fe8211333c98414e96c75515823bd5c57c6c2befc7410dac393943865254a40ffffffffffff75f5ea6c522091a2faee5a5ee31700002333fabc4f0191e28eac4327b5a3815f145b00e6113a6c09ab07190f31be5740f6c6e396adb17f61e968bce52a20a8759928e5549d4d5d7cd97e95d06aed2d2bfdbaa8feb56aac54a49497a95782d63fe3a956569cd56294bd4817b979e90934872fbec9af2fcde182b1ed9b38e75c609ced035d0ef85ea95d0d78f5b35b4e625e3ea4c721d4b377c2bef3231c9295fe35381c59a51a041fe9fac1db1b78e4a38a3a6e9d65315abc82cdd45421810b815a3194ec11c5d9e3a3f9088514700fbcfea4d4c5e7224c482ab873d47dfb676387198fb3b62aa76650707efc000000000000000000003cfbb663423cf0908d1e755c2f568e14f64bd86272abcab3910c202b9d22582e1ab6432a7cc230fde53d9792e8197939a393f75b1d9c68d742c25e9b2fa11c3d0e9986b4ae60b50b30f2ac9b26be961cac643bff8ec4c53ee922bac3a384388c5056ce6f322e497f7e97a71f3109e7a5b4f5e7181740fbf061fba2827cb90bd5b7789760e5ee111806d9196264a24a6ea5b1378dd064c2a46e2ef582ff5c706c4755da93d1d27113c124f29e9157377a63144feb5da4f15d5338f9f5acadce5ee1cf615cd910bc95a20000000000000000"], 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r2, 0x406, r2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x3f, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) mkdirat(r4, &(0x7f00000001c0)='./bus\x00', 0x1000c) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000500)=0x2) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$VT_RELDISP(r5, 0x5605) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) memfd_create(&(0x7f0000000600)='\x00', 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ftruncate(r6, 0x7fff) sendfile(r3, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 22:36:59 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x1, 0x0) write$P9_RFLUSH(r0, 0x0, 0xffffffe9) [ 583.881620] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:37:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000", 0x18}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 22:37:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:00 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x0) 22:37:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140)={0x8, 0x7f48, 0x3, 0x9, 0x5, 0x400, 0x1, 0xffffffffffffff01, 0x5, 0x1, 0x40000000000}, 0xb) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x1) ioctl(r0, 0x100008912, &(0x7f0000000300)="02979eb600145f80f9b889") r3 = socket(0x4, 0x5, 0x9) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x5, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000180)={r4, 0x8}, 0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="eb280a1a75511eb82753cf3edb473d6a", 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)) accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000001c0)={@empty, @multicast1, @multicast2}, 0xc) close(r2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) r5 = socket$inet6(0xa, 0x20000800000004, 0x83) ioctl(r5, 0x8912, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r5, &(0x7f00000003c0)=ANY=[], 0xffa1) socket$inet6_sctp(0xa, 0x5, 0x84) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x200000) ioctl$NBD_SET_BLKSIZE(r7, 0xab01, 0x10001) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x401, 0x30}, 0xc) sendmsg(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="ac", 0x1}], 0x1}, 0x4c040) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000000c0), 0xc) write$binfmt_misc(r6, &(0x7f0000000240)={'syz1'}, 0x34000) 22:37:00 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) 22:37:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 584.666563] xt_AUDIT: Audit type out of range (valid range: 0..2) 22:37:00 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) 22:37:00 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 22:37:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x321501, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000040)="3cff3d99091cd6188711130acb7fb02928c883d91cf8d03deb36339c7b4ed8ee98ea951fab315fac0fd9c77a51d5794027feae479f68774e529d738e20a80a30c76bf100e1bef43826ba7fe81026bcca3f5439b8fe00b1bdab55aa965ffafddebb6d1c3817346c0cec") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 584.825447] binder: 23158:23159 transaction failed 29189/-22, size 0-0 line 2834 [ 584.863797] binder: 23158:23162 transaction failed 29189/-22, size 0-0 line 2834 22:37:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 584.886906] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 584.919742] binder: undelivered TRANSACTION_ERROR: 29189 [ 584.925475] binder: undelivered TRANSACTION_ERROR: 29189 22:37:01 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x101000002}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) flock(r0, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00002e2f66696c65300045990846b8433ebda7438fc95c993b52a886ac184253359368657af0991d54c893282293a6b4ea7a7381fa1691b86a340000000000000000c2b6434e52cc5834d89e0dcf171afaffda5f"], 0x1) 22:37:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff00", 0x24}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:01 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc53e0ab49282d676a683568600f172c4d0d167917bd7a810e"], 0x1, 0x0, 0x0) 22:37:01 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b000000"], 0x0) 22:37:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) utimes(0x0, 0x0) close(r0) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) 22:37:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) geteuid() setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000080)={@multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0xb}}, 0xc) [ 585.497799] input: syz1 as /devices/virtual/input/input7 22:37:01 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501acee453000000000000000000000000000000000800000000000000bd99b039e384c8a2a19b40ad7e598861135e00000000"], 0x0) 22:37:01 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000140)={r2}) 22:37:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x6e4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000240)="b33656cd", 0x4) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) 22:37:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1146, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000500)) 22:37:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10020) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) [ 586.108575] binder: 23223:23225 ioctl c0306201 0 returned -14 [ 586.129252] binder_alloc: 23223: binder_alloc_buf, no vma [ 586.135726] binder: 23223:23225 transaction failed 29189/-3, size 24-8 line 2973 [ 586.192639] binder: 23223:23228 ioctl c0306201 0 returned -14 [ 586.233440] binder: BINDER_SET_CONTEXT_MGR already set [ 586.239082] binder: 23223:23225 ioctl 40046207 0 returned -16 [ 586.262812] binder_alloc: 23223: binder_alloc_buf, no vma [ 586.268655] binder: 23223:23228 transaction failed 29189/-3, size 24-8 line 2973 22:37:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) prlimit64(r4, 0xf, &(0x7f0000000500)={0x7, 0x8001}, 0x0) lgetxattr(0x0, &(0x7f0000003680)=@known='trusted.overlay.nlink\x00', &(0x7f0000000780)=""/174, 0xae) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffd2c, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:37:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff00", 0x24}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:02 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d6d", @ANYPTR]], 0x1, 0x0, 0x0) 22:37:02 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x1) bind$tipc(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0bd2430f000319", 0x7}], 0x1) 22:37:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:02 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d6d71933c93388aad5dd7c6e2911dda7a183b319700cfeab44946843b1ae6a88e15fc8a7bf973751df43c1a89b6bac578"]], 0x1, 0x0, 0x0) 22:37:02 executing program 1: inotify_init1(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:37:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:03 executing program 3: r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ftruncate(r0, 0xaf) 22:37:04 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) 22:37:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:04 executing program 3: mkdir(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) syz_open_dev$sndpcmc(0x0, 0x2, 0x80000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3f, &(0x7f0000000640)=""/230, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x2, 0x0, {0x0, 0x20}}, 0x28) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00005eaff6)='./control\x00', 0x0) 22:37:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff00", 0x24}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab650000000000000000000000649c7421ed84ba60d5d77990b428d15a000000001000000000000000712316ccca4f6b7ba0627c7ac505119500000000000000000000000000000000000000000000000000000000000000000007000000000000000000b2bd99b039e384c8a2572d48cb8f46edf574ffa19b40"], 0x0) 22:37:04 executing program 1: inotify_init1(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:37:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x828) rmdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) 22:37:05 executing program 0: r0 = socket$packet(0x11, 0xa, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) [ 589.465834] protocol 88fb is buggy, dev hsr_slave_0 [ 589.474293] protocol 88fb is buggy, dev hsr_slave_1 [ 589.483863] protocol 88fb is buggy, dev hsr_slave_0 [ 589.491559] protocol 88fb is buggy, dev hsr_slave_1 [ 589.504225] protocol 88fb is buggy, dev hsr_slave_0 22:37:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 589.511540] protocol 88fb is buggy, dev hsr_slave_1 [ 589.542752] protocol 88fb is buggy, dev hsr_slave_0 [ 589.548577] protocol 88fb is buggy, dev hsr_slave_1 22:37:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab650000000000000000000000649c7421ed84ba60d5d77990b428d15a000000001000000000000000712316ccca4f6b7ba0627c7ac5051195000000000000000000"], 0x0) 22:37:05 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000002c0)='./file0/file0\x00', 0xc042, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x84442, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000180)) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) open$dir(0x0, 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, 0x0) 22:37:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$inet_sctp(r2, &(0x7f0000007080)=[{&(0x7f0000000140)=@in6={0xa, 0x0, 0x4, @remote}, 0x1c, 0x0}], 0x1, 0x0) 22:37:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:05 executing program 3: inotify_init() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x8) [ 590.022691] protocol 88fb is buggy, dev hsr_slave_0 [ 590.028336] protocol 88fb is buggy, dev hsr_slave_1 22:37:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f44", 0x2a}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:06 executing program 5: socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x7f}) 22:37:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 22:37:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000002c0)=0x100000001, 0x118) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4, 0x0, 0x2}, 0x20) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 22:37:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) getpgrp(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x6}, 0x8, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) inotify_init1(0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000800)="65b1d456b18f68596f", 0x9) r0 = creat(0x0, 0x0) io_setup(0x40000100000003, &(0x7f0000000000)) sendmsg$unix(r0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000840)={0x14, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20000840) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 590.664493] kernel msg: ebtables bug: please report to author: Total nentries is wrong 22:37:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 590.933502] kernel msg: ebtables bug: please report to author: Total nentries is wrong 22:37:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/169, 0xa9) 22:37:07 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0bd2430f000319", 0x7}], 0x1) 22:37:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:07 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) inotify_add_watch(r0, &(0x7f00005eaff6)='./control\x00', 0x8) 22:37:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f44", 0x2a}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:07 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)}], 0x1}, 0x3}, {{0x0, 0x0, &(0x7f00000018c0)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 22:37:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], 0x0}, 0x48) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x1eed}, 0x28) 22:37:07 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/packet\x00') preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) 22:37:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) 22:37:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:07 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000003c0)="ed", 0x1}], 0x1}, 0x200000d0) close(r2) 22:37:07 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x804a) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) read(r0, 0x0, 0x0) 22:37:07 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0x2) 22:37:07 executing program 3: mkdir(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 22:37:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffd) 22:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f44", 0x2a}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:08 executing program 0: 22:37:08 executing program 1: 22:37:08 executing program 5: 22:37:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:08 executing program 0: 22:37:08 executing program 1: 22:37:08 executing program 5: 22:37:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:09 executing program 3: 22:37:09 executing program 5: 22:37:09 executing program 1: 22:37:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed7", 0x2d}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:09 executing program 0: 22:37:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:09 executing program 5: 22:37:09 executing program 1: 22:37:09 executing program 3: 22:37:09 executing program 5: 22:37:09 executing program 3: 22:37:09 executing program 1: 22:37:09 executing program 0: 22:37:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:09 executing program 5: 22:37:10 executing program 1: 22:37:10 executing program 3: 22:37:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed7", 0x2d}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:10 executing program 0: 22:37:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:10 executing program 5: 22:37:10 executing program 0: 22:37:10 executing program 3: 22:37:10 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="2e0000001c008104e00f80ecdb4cb90402c804a003000000980010fb120001000e00da1b40d819a9060015000058", 0x2e}], 0x1}, 0x0) 22:37:10 executing program 1: 22:37:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:10 executing program 0: 22:37:10 executing program 3: 22:37:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed7", 0x2d}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:11 executing program 1: 22:37:11 executing program 5: 22:37:11 executing program 0: 22:37:11 executing program 3: 22:37:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:11 executing program 0: 22:37:11 executing program 5: 22:37:11 executing program 3: 22:37:11 executing program 1: 22:37:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:11 executing program 0: 22:37:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758", 0x2e}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:12 executing program 5: 22:37:12 executing program 3: 22:37:12 executing program 1: 22:37:12 executing program 0: 22:37:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:12 executing program 1: 22:37:12 executing program 0: 22:37:12 executing program 3: 22:37:12 executing program 5: 22:37:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:12 executing program 1: 22:37:12 executing program 0: 22:37:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758", 0x2e}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:12 executing program 3: 22:37:12 executing program 5: 22:37:12 executing program 1: 22:37:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:13 executing program 5: 22:37:13 executing program 1: 22:37:13 executing program 0: 22:37:13 executing program 3: 22:37:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:13 executing program 5: 22:37:13 executing program 1: 22:37:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758", 0x2e}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:13 executing program 0: 22:37:13 executing program 3: 22:37:13 executing program 1: 22:37:13 executing program 5: 22:37:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:13 executing program 3: 22:37:13 executing program 5: 22:37:13 executing program 1: 22:37:14 executing program 0: 22:37:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:14 executing program 5: 22:37:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:14 executing program 1: 22:37:14 executing program 3: 22:37:14 executing program 0: 22:37:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:14 executing program 5: 22:37:14 executing program 0: 22:37:14 executing program 3: 22:37:14 executing program 5: 22:37:14 executing program 1: 22:37:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:15 executing program 1: 22:37:15 executing program 0: 22:37:15 executing program 3: 22:37:15 executing program 5: 22:37:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:15 executing program 1: 22:37:15 executing program 3: 22:37:15 executing program 0: 22:37:15 executing program 5: 22:37:15 executing program 1: 22:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:15 executing program 0: 22:37:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:15 executing program 3: 22:37:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/179) 22:37:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000c00)=@can_newroute={0x13, 0x18, 0xa01, 0x0, 0x0, {}, [@CGW_FILTER={0xc}, @CGW_SRC_IF={0x8}]}, 0x28}}, 0x0) 22:37:15 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f000022c000/0x4000)=nil, 0x4000}}) 22:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x80080) 22:37:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:16 executing program 3: 22:37:16 executing program 0: 22:37:16 executing program 1: 22:37:16 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501acee453000000000000000000000000000000000800000000000000bd99b039e384c8a2a19b40ad7e598861135e000000000000000000009fac"], 0x0) 22:37:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e003e420f8cf6ffffff430fa8c442019dccd3195bb8") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKROSET(r1, 0x125d, 0x0) 22:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 22:37:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:37:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 22:37:16 executing program 3: 22:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:16 executing program 0: 22:37:17 executing program 1: 22:37:17 executing program 0: 22:37:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:17 executing program 3: 22:37:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:17 executing program 1: 22:37:17 executing program 5: 22:37:17 executing program 0: 22:37:17 executing program 3: 22:37:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:17 executing program 1: 22:37:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:17 executing program 3: 22:37:17 executing program 0: 22:37:17 executing program 5: 22:37:17 executing program 1: 22:37:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:17 executing program 5: 22:37:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:37:18 executing program 0: 22:37:18 executing program 3: 22:37:18 executing program 1: 22:37:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:18 executing program 0: 22:37:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 22:37:18 executing program 3: 22:37:18 executing program 5: 22:37:18 executing program 1: 22:37:18 executing program 0: 22:37:18 executing program 3: 22:37:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 22:37:18 executing program 5: 22:37:18 executing program 0: 22:37:18 executing program 3: 22:37:18 executing program 1: 22:37:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 22:37:19 executing program 5: 22:37:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:19 executing program 1: 22:37:19 executing program 0: 22:37:19 executing program 3: 22:37:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 22:37:19 executing program 1: 22:37:19 executing program 5: 22:37:19 executing program 0: 22:37:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:19 executing program 1: 22:37:19 executing program 3: 22:37:19 executing program 5: 22:37:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 22:37:19 executing program 0: 22:37:19 executing program 1: 22:37:19 executing program 5: 22:37:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:20 executing program 0: 22:37:20 executing program 1: 22:37:20 executing program 3: 22:37:20 executing program 5: 22:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 22:37:20 executing program 3: 22:37:20 executing program 5: 22:37:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x0, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:20 executing program 0: 22:37:20 executing program 1: 22:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:20 executing program 5: 22:37:20 executing program 1: 22:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:20 executing program 3: 22:37:20 executing program 0: 22:37:20 executing program 5: 22:37:21 executing program 3: 22:37:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:21 executing program 0: 22:37:21 executing program 5: 22:37:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:21 executing program 1: 22:37:21 executing program 3: 22:37:21 executing program 0: 22:37:21 executing program 3: 22:37:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:21 executing program 1: 22:37:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:21 executing program 5: 22:37:21 executing program 0: 22:37:21 executing program 1: 22:37:21 executing program 3: 22:37:21 executing program 5: 22:37:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:22 executing program 1: 22:37:22 executing program 0: 22:37:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:22 executing program 3: 22:37:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0005c5ffffff000d0000000200001f0b000000ec0007c913000100f0ffff0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 22:37:22 executing program 1: 22:37:22 executing program 5: 22:37:22 executing program 0: 22:37:22 executing program 3: 22:37:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:22 executing program 3: 22:37:22 executing program 1: 22:37:22 executing program 5: 22:37:22 executing program 4: 22:37:22 executing program 0: 22:37:22 executing program 3: 22:37:22 executing program 1: 22:37:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:23 executing program 3: 22:37:23 executing program 5: 22:37:23 executing program 1: 22:37:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 22:37:23 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0xffffffdc) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e0000000001000000000000000a4733ad197f24acc233eeae07d0e0369005000000e50fc66f0a1c38"], 0x1, 0x0, 0x0) 22:37:23 executing program 3: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100000000000000, 0x1100, 0xaa, 0x80fe}, 0x80, 0x0}, 0x0) 22:37:23 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000240)="0bd2530f000319", 0x7}], 0x1) 22:37:23 executing program 5: 22:37:23 executing program 4: 22:37:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4ed4, &(0x7f0000000100)) 22:37:23 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) pipe(&(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 22:37:23 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cd418e50fc4909198cc53e0ab49282d676a683568607917bd7a810ecc22ddfcf63ba3c7f0cf68535adb15c1fc393c74025857176be15f83c3f6608b8fc29c5a4ab5d6ca000000000000a25fdbac82f3707a4d8c3c5cea8d09ec3d247ca2c0057953a2735c9c72b65cba"], 0x1, 0x0, 0x0) 22:37:23 executing program 5: get_thread_area(&(0x7f0000000000)={0x80000001, 0x20000000, 0x0, 0x9, 0x7, 0x2, 0x1, 0x7, 0x9, 0x6}) r0 = socket(0x13, 0x8000e, 0x2) connect$netlink(r0, &(0x7f0000000240), 0xc) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000080}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) socket$nl_route(0x10, 0x3, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000180)) r4 = creat(&(0x7f0000000380)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r5 = dup2(r3, r4) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x83e, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) 22:37:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:24 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80044325, &(0x7f0000000080)) 22:37:24 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000087ffab650000000000000000000000649c7421ed84ba60d5d77990b428d15a000000001000000000000000712316ccca4f6b7ba062"], 0x0) 22:37:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(0x0, &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:24 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@hat={'changehat ', 0x0, 0x5e, ['selfmd5sum,+system^ppp1\x00', ':!#:keyringselfeth0ppp0%+ppp1\x00', 'proccpuset:)\x00', 'system\x00']}, 0x67) 22:37:24 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80044325, &(0x7f0000000080)) [ 608.250576] audit: type=1400 audit(1546641444.292:38): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=24080 comm="syz-executor1" 22:37:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) 22:37:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000200)="c66abb079d5299756f8c7d545c503436fd7d7bcde8b7fb703e387340d1465bae8111bce2ead369d2852a4d30579939df4bb1f9d15096eb3d746aaa6ce789d4fc2824e13800d33ffa5c162d3d91750a49f80fceee26ecc3b58d4e4f3c876f2e385f14e7a411a22a2cb261c234cc9230b42cd48a411e41ef59fabf635049ab04b8c9f9ac2afac68ea539618ee4e284f79e", 0x90) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@loopback, 0x45, r2}) 22:37:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(0x0, &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:24 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) 22:37:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000c03000)=[@in], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000564000), 0x0) 22:37:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000c00)=@can_newroute={0x1c, 0x18, 0xa01, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x8, 0xd, 0x3}]}, 0x1c}}, 0x0) 22:37:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(0x0, &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$TCSETSF(r1, 0x5437, 0x0) 22:37:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000c00)=@can_newroute={0x28, 0x18, 0xa01, 0x0, 0x0, {}, [@CGW_FILTER={0xc}, @CGW_SRC_IF={0x8}]}, 0x28}}, 0x0) 22:37:25 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501acee453000000000000000000000000000000000800000000000000bd99b039e384c8a2a19b40ad"], 0x0) 22:37:25 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x0) 22:37:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:25 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) sendfile(r0, r2, 0x0, 0x200800100000001) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) 22:37:25 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d6d71933c93388aad", @ANYPTR]], 0x1, 0x0, 0x0) 22:37:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) listen(r1, 0x0) 22:37:25 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0006bb404feff141c02fc59ff6e10b500000780cc08000200ac141410", 0x24) 22:37:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000000)={'team0\x00', @ifru_mtu}) 22:37:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:25 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 22:37:25 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501ace"], 0x0) 22:37:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) io_setup(0x4ed4, &(0x7f0000000100)) 22:37:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) r1 = dup(r0) ioctl$UI_SET_KEYBIT(r1, 0x541b, 0x0) 22:37:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53c2f74172d031de4d4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c10000000000000009b4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:25 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001580)=[{&(0x7f0000000500)=""/4096, 0x1039}], 0x1) 22:37:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000180)={0x0, "fa975e122ed76f776f459e68093413b998cf433600e2ff2ef099cdb9c77a171e"}) 22:37:26 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000001580)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1) 22:37:26 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80024321, 0x0) 22:37:26 executing program 5: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x4000000003, 0x0) r2 = dup3(r1, r0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getaddr={0x18, 0x16, 0x203}, 0x18}}, 0x0) 22:37:26 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/66, 0x42}], 0x1, &(0x7f0000000780)=""/173, 0xad}, 0x10020) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, 0x0, 0x0, 0x1}, 0x20) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000380)=@buf) unlink(&(0x7f0000000900)='./file0/file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="16630000"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) shutdown(0xffffffffffffffff, 0x1) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x8, 0x0, &(0x7f0000000840)=[@release={0x40046306, 0x3}], 0x13c, 0x0, &(0x7f0000000b80)="6016a5d4e58179d7d65f55c5638f28b64733fc09a8abc445c45af12efa4e5bbb9df3493f4667ca45ced3eba2ec1656bfd435c1ef6c34ba62f180638d44a5c36bb90504e91e476500ffed544c7c4f6db350079f413e0e455fca1e0fe925f2d14c6b66603565e440f7c659fc5bd5153946bf829539f5d071ce226867e2c4a1794651c8756b5b9433cb0e5a8badfd4fd724aebb227a3b6e71f65329338456384ece327e3b4ad98c9083210de8a71758b738327f6ae0380ff3ba4df8ab0d9476c6870d544405f0c2fc3dae56786d3a89e65a3910a9c4a27924a28ddbc78636f02c70288efb29cda64231a89aa5f03a92502983d7d6b6abc0e13cf9f232fb598089b353bcb0ee05915b292063b8654d9085d0c8a35388467d6f13c876d3c975b3b002ea924815af3f3e35ef8164d7bc4de96a4fc87caf68017e53dc14d746"}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000540)={{0x9, 0x3, 0xc72, 0x0, '\x00', 0x9}, 0x0, 0x2, 0x9, r5, 0x1, 0x4, 'syz1\x00', &(0x7f0000000100)=['!proccgroup\x00'], 0xc, [], [0x6, 0x3, 0xe8a4, 0x3]}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000180)=0xffffffffffffffe0, 0x4) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000003c0)={0x24e, 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="0000020000000000b110d11572474e9343074cf21dd69d497c16ff0d06aca788628e57fa3b2feda21d58ca0ecf4573a4ebd5f9a5554f40447118df2c8421151b95797440369627e825f1e88bf6761156645007430fa03013054b5d3cab683d97f3e181b14ff59b082ce68fa375578444f5958c282077a8e2e8513b9e762ccfa1af198273b92886904e60c5a2defbf2cfa390da654a103eca899a7daa9b2d39b8135947f85ee9a83ffa86b9ba97b156a0ee7b54e6609bec416ebbec93cead47b5e19c6276b58b0a6fd61f543781e4faa12670e5fd1c6210542354cc66cdb0667f52ca6824c263d8d8aaaefb6af628c8d9b4f6e6ba58bdb1b15c9b211d239185d0e56e011d94c0d2cc22474ac7e5e31671fcaae91094961cee12f1815ba13a78b6e2ee3b544a13539b5e40d2057c667e008743dcd94d4d15e45578468ae1351e9d4ea9eba87e6afee5ea8aa8bc3093ff7e0a0e48f01acd4eac8f84723ca4fca95ee8b4795a95169d6a4cdb8dd300000000f3904146ae1d483a43bd3a7650e438ac8882775472eacea53aab3b412955a79e6fddfe3905fadf460ee046518e5ee266dc6e2571b6943f8ca97c93ee05f766e88f7046f6255217808f0df250d591a8229866e2fc32fed14921dec315a23bcc611f776c8b942cf90b7826afed607285c5c2a54c162b955a9d00fc5151e83d6d5b344bde8e7a55cce5e29e8c365afba4afe3b4ce97aaf68a061ad398d6d46736f9ffe5e56bc15a83daf5168c8d2802a779a4baafc4165a55806719139700ea39b4eb9b5841373fede978eb350bc7800dcfea78ff5ee6fac7c0941d243d6a90"], 0x0, 0x0, 0x0}) memfd_create(0x0, 0x0) 22:37:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), 0x0) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 610.412605] binder: 24190:24193 unknown command 25366 [ 610.418460] binder: 24190:24193 ioctl c0306201 20000140 returned -22 22:37:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x19f, 0x2000000209e20, 0x2}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, r2, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x2c) 22:37:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000000240)="04", 0x1, 0x40, 0x0, 0x0) [ 610.459788] binder: 24190:24198 Release 1 refcount change on invalid ref 3 ret -22 22:37:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), 0x0) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 610.546516] binder: 24190:24193 unknown command 131072 [ 610.552327] binder: 24190:24193 ioctl c0306201 200003c0 returned -22 22:37:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:37:26 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cd418e50fc4909198cc53e0ab49282d676a683568607917bd7a810ecc22ddfcf63ba3c7f0cf68535adb15c1fc393c74025857176be15f83c3f6608b"], 0x1, 0x0, 0x0) 22:37:26 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000001d00000000000000000000110000005fe83c4b0000000000000000000000fa000000000000000000000000000000000000009691501acee453000000000000000000000000000000000800000000000000bd99b039e384c8a2a19b40ad7e598861135e000000000000000000009fac29b991e8e693b9514de0ae167128de04846b6f6f4bced45950ce311c204b30d41e032f42c0bf187cae9b650f274b"], 0x0) 22:37:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statfs(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 610.822889] protocol 88fb is buggy, dev hsr_slave_0 [ 610.828750] protocol 88fb is buggy, dev hsr_slave_1 22:37:27 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 22:37:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), 0x0) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) execve(0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="2aceca77a610a2f2234e891e4f9b157aa475c56541a050356f12dfa24a41aac25acd24b54cb405c797a2b78f1b0b254ae790fd48670d8057cf0052e6b4cb5eb70c46c730846d231db596f81ca9d366a9be57ff3a649a202533ab35a7a6ea950b1435d0e0a31e4d05234d6d71933c93388aad", @ANYPTR]], 0x1, 0x0, 0x0) 22:37:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0xffffff84, 0x0, @dev={0xfe, 0x9500, [0x0, 0x0, 0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) 22:37:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 22:37:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) syz_open_pts(r0, 0x0) 22:37:27 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0}, 0x200008c4) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x616, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 22:37:27 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000005c0), 0x1000) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0xfdf5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000000000b08956d069e000200002066ce654d316e6f446576656d31f6f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f756024"], 0x90) 22:37:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 611.382607] protocol 88fb is buggy, dev hsr_slave_0 [ 611.388280] protocol 88fb is buggy, dev hsr_slave_1 22:37:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000c00)=@can_newroute={0x1c, 0x18, 0xa01, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x8}]}, 0x1c}}, 0x0) 22:37:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00') sendfile(r1, r2, 0x0, 0x100000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:37:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) 22:37:27 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cd418e50fc4909198cc53e0ab49282d676a683568607917bd7a810ecc22ddfcf63ba3c7f0cf68535adb15c1fc393c74025857176be15f83c3f6608b8fc29c5a4ab5d6ca000000000000a25fdbac82f3707a4d8c3c5cea8d09ec3d247ca2c0057953a2735c9c72b65cbaf8"], 0x1, 0x0, 0x0) 22:37:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:27 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) 22:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:28 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) inotify_init() 22:37:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') inotify_rm_watch(r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 22:37:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) sendfile(r0, r2, 0x0, 0x200800100000001) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, 0x0) [ 612.342546] protocol 88fb is buggy, dev hsr_slave_0 [ 612.348213] protocol 88fb is buggy, dev hsr_slave_1 [ 612.354187] protocol 88fb is buggy, dev hsr_slave_0 [ 612.359842] protocol 88fb is buggy, dev hsr_slave_1 [ 612.365823] protocol 88fb is buggy, dev hsr_slave_0 [ 612.371503] protocol 88fb is buggy, dev hsr_slave_1 22:37:28 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) 22:37:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0xffffffdc) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e0000000001000000000000000a4733ad197f24acc233eeae"], 0x1, 0x0, 0x0) 22:37:28 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x0) 22:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f0000000040)) close(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = open(0x0, 0x200501043, 0x100) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0xffffffffffffff44) writev(0xffffffffffffffff, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000140)={0x4, 0x80000001}, 0x10) 22:37:28 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80044323, &(0x7f0000000080)) [ 612.647936] binder: 24314:24315 got transaction with invalid offset (0, min 0 max 0) or object. [ 612.657117] binder: 24314:24315 transaction failed 29201/-22, size 0-8 line 3035 22:37:28 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000010000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc53e0ab49282d676a683568600f172c4d0d167917bd7a810ecc22ddfcf63ba3c7f0cf68535adb15c1bc39c7"], 0x1, 0x0, 0x0) 22:37:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) [ 612.734674] binder: undelivered TRANSACTION_ERROR: 29201 22:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:28 executing program 1: keyctl$unlink(0x16, 0x0, 0xfffffffffffffffd) 22:37:28 executing program 5: io_setup(0x4ed4, &(0x7f0000000100)) 22:37:28 executing program 0: mlockall(0x4) getrusage(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001dc0)='pids.events\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000001f40)={0x8}, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlink(0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000002040)) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000002140), 0x80000) clone(0x80000000, &(0x7f0000002240), 0xfffffffffffffffe, 0x0, &(0x7f0000002380)="935e78453aebfcc445f04e9fd665dfaf4e82dcafe18efec252bd279a1eeba1") getitimer(0x2, &(0x7f0000002580)) setsockopt$inet_tcp_int(r0, 0x6, 0x26, &(0x7f0000002600)=0x1, 0x4) ioctl$void(r0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000002640)={0x7, 0x7b, 0x1}, 0x7) 22:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000c03000)=[@in], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000564000), 0x0) 22:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000)=0x17, 0x4) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000400)=0x0) prlimit64(r3, 0xf, &(0x7f0000000500)={0x7, 0x8001}, &(0x7f0000000540)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000003680)=@known='trusted.overlay.nlink\x00', &(0x7f0000000780)=""/174, 0xae) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, &(0x7f00000000c0)=0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x8000, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0xf6ce, 0x0) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000380)) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:37:29 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) pipe2(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 22:37:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x212001, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x287) getsockname(r0, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) 22:37:29 executing program 3: 22:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:29 executing program 5: 22:37:29 executing program 0: inotify_init1(0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 22:37:29 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x269, 0x0) 22:37:29 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000200)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="20e8c297896aa273c908915a8fc6080c916c1ae02ce1a67c78935338bc1b03d77e"], 0x1, 0x0, 0x0) 22:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = inotify_init1(0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000a40)="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") r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) fstat(r2, &(0x7f0000001ec0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000002180)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000004500)) stat(&(0x7f0000004540)='./bus/file0\x00', &(0x7f0000004580)) fstat(r5, &(0x7f0000004600)) gettid() getresuid(&(0x7f0000004a00), 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004b00)) getgroups(0x2, &(0x7f0000004b40)=[0x0, 0xee01]) fcntl$getown(r3, 0x9) stat(&(0x7f0000004e00)='./file1\x00', &(0x7f0000004e40)) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006600)={{{@in=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000006740), &(0x7f0000006780)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000067c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006800)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000006900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000006940), &(0x7f0000006980)=0xc) getpgrp(0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 22:37:30 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000003c0)="ed", 0x1}], 0x1}, 0x200000d0) close(r2) [ 614.033199] ================================================================== [ 614.040671] BUG: KMSAN: uninit-value in _decode_session4+0x3d0/0x1c90 [ 614.047298] CPU: 1 PID: 24377 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #2 [ 614.054498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.063876] Call Trace: [ 614.066500] dump_stack+0x173/0x1d0 [ 614.070171] kmsan_report+0x12e/0x2a0 [ 614.074022] __msan_warning+0x82/0xf0 [ 614.077865] _decode_session4+0x3d0/0x1c90 [ 614.082170] __xfrm_decode_session+0x152/0x210 [ 614.086796] ? xfrm4_get_saddr+0x3e0/0x3e0 [ 614.091066] vti_tunnel_xmit+0x190/0x1b00 [ 614.095247] ? dev_queue_xmit_nit+0x1185/0x1260 [ 614.099999] ? vti_tunnel_init+0x2f0/0x2f0 [ 614.104275] dev_hard_start_xmit+0x607/0xc40 [ 614.108748] __dev_queue_xmit+0x2e42/0x3bc0 [ 614.113145] dev_queue_xmit+0x4b/0x60 [ 614.116974] ? __netdev_pick_tx+0x1270/0x1270 [ 614.121500] packet_sendmsg+0x8306/0x8f30 [ 614.125682] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 614.131090] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 614.136567] ? rw_copy_check_uvector+0x149/0x650 [ 614.141388] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 614.146846] ___sys_sendmsg+0xdb9/0x11b0 [ 614.150953] ? do_futex+0x350/0x68a0 [ 614.154707] ? compat_packet_setsockopt+0x360/0x360 [ 614.159781] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 614.165196] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 614.170601] ? __fget_light+0x6e1/0x750 [ 614.174629] __sys_sendmmsg+0x570/0xa60 [ 614.178667] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 614.184139] ? prepare_exit_to_usermode+0x114/0x420 [ 614.189192] ? syscall_return_slowpath+0x50/0x650 [ 614.194070] __se_sys_sendmmsg+0xbd/0xe0 [ 614.198181] __x64_sys_sendmmsg+0x56/0x70 [ 614.202388] do_syscall_64+0xbc/0xf0 [ 614.206171] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 614.211387] RIP: 0033:0x457ec9 [ 614.214604] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.233542] RSP: 002b:00007f497c40dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 614.241273] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 614.248549] RDX: 0000000000000269 RSI: 0000000020871fc8 RDI: 0000000000000004 [ 614.255830] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 614.263114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f497c40e6d4 [ 614.270391] R13: 00000000004c4b8a R14: 00000000004d82c0 R15: 00000000ffffffff [ 614.277688] [ 614.279318] Uninit was created at: [ 614.282884] kmsan_internal_poison_shadow+0x92/0x150 [ 614.287997] kmsan_kmalloc+0xa6/0x130 [ 614.291809] kmsan_slab_alloc+0xe/0x10 [ 614.295720] __kmalloc_node_track_caller+0xe18/0x1030 [ 614.300920] __alloc_skb+0x309/0xa20 [ 614.304645] alloc_skb_with_frags+0x1c7/0xac0 [ 614.309173] sock_alloc_send_pskb+0xafd/0x10e0 [ 614.313767] packet_sendmsg+0x661a/0x8f30 [ 614.317932] ___sys_sendmsg+0xdb9/0x11b0 [ 614.322004] __sys_sendmmsg+0x570/0xa60 [ 614.325994] __se_sys_sendmmsg+0xbd/0xe0 [ 614.330069] __x64_sys_sendmmsg+0x56/0x70 [ 614.334228] do_syscall_64+0xbc/0xf0 [ 614.337966] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 614.343157] ================================================================== [ 614.350519] Disabling lock debugging due to kernel taint [ 614.355977] Kernel panic - not syncing: panic_on_warn set ... [ 614.361888] CPU: 1 PID: 24377 Comm: syz-executor3 Tainted: G B 4.20.0-rc7+ #2 [ 614.370504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.379882] Call Trace: [ 614.382502] dump_stack+0x173/0x1d0 [ 614.386410] panic+0x3ce/0x961 [ 614.389664] kmsan_report+0x293/0x2a0 [ 614.393495] __msan_warning+0x82/0xf0 [ 614.397323] _decode_session4+0x3d0/0x1c90 [ 614.401597] __xfrm_decode_session+0x152/0x210 [ 614.406201] ? xfrm4_get_saddr+0x3e0/0x3e0 [ 614.410456] vti_tunnel_xmit+0x190/0x1b00 [ 614.414622] ? dev_queue_xmit_nit+0x1185/0x1260 [ 614.419343] ? vti_tunnel_init+0x2f0/0x2f0 [ 614.423603] dev_hard_start_xmit+0x607/0xc40 [ 614.428070] __dev_queue_xmit+0x2e42/0x3bc0 [ 614.432453] dev_queue_xmit+0x4b/0x60 [ 614.436278] ? __netdev_pick_tx+0x1270/0x1270 [ 614.440793] packet_sendmsg+0x8306/0x8f30 [ 614.444964] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 614.450363] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 614.455832] ? rw_copy_check_uvector+0x149/0x650 [ 614.460638] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 614.466089] ___sys_sendmsg+0xdb9/0x11b0 [ 614.470165] ? do_futex+0x350/0x68a0 [ 614.473910] ? compat_packet_setsockopt+0x360/0x360 [ 614.478964] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 614.484373] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 614.489760] ? __fget_light+0x6e1/0x750 [ 614.493785] __sys_sendmmsg+0x570/0xa60 [ 614.497817] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 614.503297] ? prepare_exit_to_usermode+0x114/0x420 [ 614.508332] ? syscall_return_slowpath+0x50/0x650 [ 614.513217] __se_sys_sendmmsg+0xbd/0xe0 [ 614.517324] __x64_sys_sendmmsg+0x56/0x70 [ 614.521509] do_syscall_64+0xbc/0xf0 [ 614.528642] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 614.533857] RIP: 0033:0x457ec9 [ 614.537078] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.556000] RSP: 002b:00007f497c40dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 614.563730] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 614.571103] RDX: 0000000000000269 RSI: 0000000020871fc8 RDI: 0000000000000004 [ 614.578439] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 614.585727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f497c40e6d4 [ 614.593014] R13: 00000000004c4b8a R14: 00000000004d82c0 R15: 00000000ffffffff [ 614.601373] Kernel Offset: disabled [ 614.605012] Rebooting in 86400 seconds..