") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x10006, 0x40001) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) fcntl$getown(r3, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000580)) r5 = getpgid(0xffffffffffffffff) getpgid(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpu\x01\xed\xc0acc\t\x00\x00\x00\x00\x00\x00\x00\x89ser\x00\xbe\x89p\x1c{\xbfGJ;\xb5J\xec\x88\a\xf0\xf4@\x05\xba+\xbe\xfe\xf2.\xc62\xc3\xe6\xe0\tcuK\t\x8aQ~\xa1\xf3\x9bt\xe9\xb2OE\r\x03&\x1d\xe8\x10P\'&\xe6\xc5\x01\xc9\x19\xc2\xd3F\x8e\x19\xc1E\x01\x00\xe6G\xd6H\xa0\xfb\r-\xe9\x1c\x16\x82\xd0\xf4\x01\x01\x00\x00_&x\x00\vV\x15Y\xed%?\r\x86r\xa0\xcb\x96H\xd9i\x1d>%_\xaaT\xda\xbe\xd6\xf4\xb9\x05\x1b\x8d]mn`\xb4G{d\xf1\xc2!\xba\xf2\xbe\xf1\xa0\x10+\xb3\x80#`\xe7\x9d=\x13\xf5(\xa5q\xdd\x7f\xcc\x1f\x9e\x16\x88\x0e\xb8\r\'*\x06\x9b\xb7\xf8e\x8f\x01\x9c\xa4>\a\xde\x95*\xc8\xdb\xd96\x93s#h\xaad\t\xdf}\xbd\xe4_\x8db\xcf\x16\'\xfc(\x9a!_B\xfb\xa3\xb84\x92`:\xa8Q\vuZ\xd8%[3Y\xa8\f\xd3\x1d', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r7, 0x7, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff0300096c00000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1bb4c971355ddee517b7e55ce1033cedf1"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5020, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:33:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x408040, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f00000001c0)={0x0, 0x5}, 0x2) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000240), 0x6) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, 0xfffffffffffffde2) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = gettid() syz_open_procfs(r4, &(0x7f0000000100)='fd/3\x00') 23:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x200, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) read(r2, &(0x7f0000000040)=""/11, 0xb) r3 = syz_open_pts(r2, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000480)={0x0, 0x0}) r5 = getpid() kcmp(r4, r5, 0x6, r1, r0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r7 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockname$netrom(r1, &(0x7f00000003c0)={{0x3, @bcast}, [@bcast, @bcast, @default, @rose, @default, @netrom, @bcast]}, &(0x7f0000000440)=0x48) eventfd(0x0) getitimer(0x1, &(0x7f0000000380)) sendmmsg(r7, &(0x7f00000092c0), 0x3fffffffffffedd, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000002c0)=""/132) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r8+30000000}, 0x0) 23:33:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004001) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000001, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r4, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) [ 555.327622] nla_parse: 3 callbacks suppressed [ 555.327631] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000380)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x80000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f00000004c0)=0x54) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000500)={'bridge0\x00', 0x1}) keyctl$set_timeout(0xf, r0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000008001, 0x0) 23:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_mr_cache\x00') ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x1, 0x0, 0x1, 0x9, 0x7, 0x1f1, 0x100000000, 0x1000, 0x8000, 0x58, 0xba4, 0x20}) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207000902000000a8a9897bbb73ec91"], 0x10}}, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x2}, 0xffffffb6) getpeername(r0, 0x0, 0x0) [ 555.473541] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000000c0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'GPL\x00'}, 0x2f, r0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 555.610862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:33:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x604001, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r3 = dup2(r1, r0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000200)='^eth0lo\x00', 0x8) setsockopt$sock_int(r2, 0x1, 0x1b, &(0x7f0000000280)=0xffffffff, 0x4) 23:33:59 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000300)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010008e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:33:59 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:33:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2804c2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 555.844271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000380)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x80000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f00000004c0)=0x54) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000500)={'bridge0\x00', 0x1}) keyctl$set_timeout(0xf, r0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000008001, 0x0) 23:34:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40000068c00000000000000000000000000000000000000d50202bc671c25ced25468515c8e36ac8903d0b05dea9e32de4c9839f01adb2653d40581b37c78d974ac9de9f38673c0a9011d860cdbb67de10eedcdae342b3d788e529ed858b80711e88c3a499acebd4c8427e515c736d61848c9ba973cd94e796fa16f0cbb4f0463f8bb0158a5201bef22cdf873788a0bf63dc64ac3a2584a64676cd153cecf8512f508e24d630ce76fcc7894d7020d86165483e24b1252483cdce3ebe053591a09716d680482ad774a8d5e59c4530bc20d056d9ef72c"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffb, 0x10000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000100)=0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:00 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/377], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 3: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000380)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x80000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f00000004c0)=0x54) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000500)={'bridge0\x00', 0x1}) keyctl$set_timeout(0xf, r0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000008001, 0x0) 23:34:00 executing program 3: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 556.338527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 556.449529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:00 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x0, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = getpid() sched_setparam(r0, &(0x7f0000000200)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x1, 0x0) sendto$x25(r1, &(0x7f0000000100)="c21676bf58858cd8adb04a32c71016c5e43ba60206b29af7c2aaebd7c1673016ebf2455297d94d54db0d28186b20d21060f4eb46beb575518654ffa7a9495e2ac9d1bd748f5f727dcd", 0x49, 0x800, &(0x7f00000001c0)={0x9, @remote={[], 0x0}}, 0x12) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000380)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x80000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f00000004c0)=0x54) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000500)={'bridge0\x00', 0x1}) keyctl$set_timeout(0xf, r0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000008001, 0x0) 23:34:00 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca3ace340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6bf92239bdf73702216d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:00 executing program 3: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7fffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x9aa2}}, 0x1, 0x4}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r1, 0x2, 0x81, "8962d32b80fa43a90d422a2c3eefd4c246b7d8117fc346c840b259fe9289b04c73255b889baa66aaff8e70cb14c503e20615a79316ad1a8813c23e7e4b25ade55e0ebaf7cb028ba51ef0a3c02727ad09fcc22b5865e7653c8c8470d812ff9f1ac9bbc3201703eccfb77412bb2466fb472814cba9c80f896df1247fc1c2baa247a9"}, 0x89) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x0, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x113, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x55, "9aa145", "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"}}, 0x110) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000140)) [ 556.802255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7fffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x9aa2}}, 0x1, 0x4}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r1, 0x2, 0x81, "8962d32b80fa43a90d422a2c3eefd4c246b7d8117fc346c840b259fe9289b04c73255b889baa66aaff8e70cb14c503e20615a79316ad1a8813c23e7e4b25ade55e0ebaf7cb028ba51ef0a3c02727ad09fcc22b5865e7653c8c8470d812ff9f1ac9bbc3201703eccfb77412bb2466fb472814cba9c80f896df1247fc1c2baa247a9"}, 0x89) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x0, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:01 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) r5 = fcntl$getown(r2, 0x9) getpgid(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r7, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7fffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x9aa2}}, 0x1, 0x4}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r1, 0x2, 0x81, "8962d32b80fa43a90d422a2c3eefd4c246b7d8117fc346c840b259fe9289b04c73255b889baa66aaff8e70cb14c503e20615a79316ad1a8813c23e7e4b25ade55e0ebaf7cb028ba51ef0a3c02727ad09fcc22b5865e7653c8c8470d812ff9f1ac9bbc3201703eccfb77412bb2466fb472814cba9c80f896df1247fc1c2baa247a9"}, 0x89) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0xffffffffffffff0a) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x0, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/111) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 557.167748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 557.330620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:01 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r4, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000300)={0x9, 0x1000, 0xc36, 0x14b, 0x6, 0x2, 0x1, 0x3, 0x1, 0x8}) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000000000009f01e7000000000095000000000015006a31343e6294ebc8171e2d70d3e5089046267363c44b9cbba81407fa84c8280d9653b7b217af2ab5edaba50c7c4212f3810a14f2220592c921af32a9a29ac5f4e8c45c09f5ba00e8d99d6a532ec22319"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x2) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x0, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='veth0_to_bond\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x1000) shmdt(r1) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 557.558036] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@l2, &(0x7f0000000140)=0x80, 0x80800) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000200)="71443a3f2c999bb588b09aa547fa6a30b88c3374bbce3a8946ee97f40dfda675c59bb40eb698883b6420763e82ee38dc3dfefcdc35c94a27fc9c4d862855e1a474aa748a39c9ae2eb698b2ec54c16a71ad390cbc8d6d30ea2ae1b2c78a81c3b9cfd2dec334920efac8273208bdd53d68798e165fa01762385039e5837de5c98cc69780cd2da3b83a54e0b30e2ed21110c099ad7a74ef48c59a3fff7d290ebb7f9a75d4f461faa01803b719d532b8f2d117d36aa8aabb3c81f83c784b", 0xbc}, {&(0x7f00000002c0)="39331ef3571e4ca47ac851b9f62673a174339e6a408ef2", 0x17}, {&(0x7f0000000500)="1654cfb722eea245bd21dfca230105fe494ff8270d00e4a3e90dba4f2ff143688e2e52b132e263ef5587eddc46945a23988b50da9e62df77dbf538eb43bf5a3641cc216b269d2ed9363c6974a96c064177b4803329eb4cd3eda30a8a7425634a9dfefe47029c75d6b2f3aab2433dca62e79a0620030b242b3a87f77d327c7ce99907bb2dd3bdf159f9c7a35c756e4bdd31699b15f6f965407a360944711e45d344e82877f1259bb62760b587b8f1d08ab016e59417615e9034e30da4e306dc87902e43db273696e87260aae59825b3f7ce7e6212", 0xd4}, {&(0x7f0000000600)="9ec7e6a7da698ae63e761bdd21ce739ae51fcdef71d3c8d3d5b0ef8ffbcbde04e5d92a709931402584dd43dbfbb93cc22465480cda54e7887731204a89b80bc740b0114fa13e3cb72db25f47878e2a1cf5afa9aa3540b7337c168364c20800a73402f36ac0986e184d9cc7e036489de618e9b8b9f2bcc1e161df0fb450f814ca5f74d86b613652ae19a303a6efacdf0560d47372679d2a8186855d4a82166bd78ac7e4125a32b662c5ec6a3cd196c07c696679b49019e7052c843f4eb69803767e8d6d837197ffb53a74257798bc6cbe01f5", 0xd2}], 0x4, 0x0, 0x0, 0x1}, 0x800) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x0, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) 23:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000280)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000001c0)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767ead3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af300835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6bf1cd65212bd75397c83044599e3cff42fee1716824f95aa9609e3d5cda6a57c8b1b3ae964536ee6449dae25b56929fc7e6e06d30b180c", 0xba, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x401, 0x0, 0x5, 0x7fffffff, 0x80}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000380)={r2, 0xfff, 0x0, 0x4, 0x3}, &(0x7f00000003c0)=0x18) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:01 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cfa5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) 23:34:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000001c0)={0xb7, @multicast2, 0x4e24, 0x0, 'sed\x00', 0x31, 0x4, 0x10}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0x1, 0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000140)={0x1c, 0x101, 0x20}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) 23:34:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4008201, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40089b20627f8a4961b00000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000380)=0xc) getpgid(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000000c0)=0x1) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:02 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:02 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x0, 0x100}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r4) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:02 executing program 1: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000e0ff9eff0300000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:02 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000008c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@raw=[@map={0x18, 0x3, 0x1, 0x0, r0}], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x5f, &(0x7f00000005c0)=""/195, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x805}, 0xffffffffffffff6b, 0x10, &(0x7f0000000780)={0x0, 0x80, 0x0, 0x4}}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1c000, 0x800) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000100)=0x3) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, 0x0, 0xfffffffffffffddd) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000380)={@generic={0x9, "804b1b0a23633b9cd4a776dd676c9b3c03a9c7279b39dc95811b60b0a7973b95a0192032d707e6116f0062dc3d3fab2cec989d499d4ed8a42ca1b8800d33c873a69eaa92dcd7706cbce650bc972bd7bd53f83ff668402835073562d70897613d41e02c559c3246525293cdf92146117b8cb448ac44ad8b91ce001e929c70"}, {&(0x7f0000000200)=""/178, 0xb2}, &(0x7f00000002c0), 0x1}, 0xa0) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/339], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40000000000000024ffcffaef7449bb184f57a49f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0xd2b7a50b7eb21624, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000000c0)) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0f42", 0x53) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x40, 0x2) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x5, 0x1200000000000000, 0x100000001, 0x1, r0, 0x4df9, [], r1, r0, 0xffff}, 0x3c) mq_timedsend(r0, &(0x7f00000001c0)="c773a0b0c64ac8b8774022fdb12ddddfabffc766293637c08a968ff567ac2ee9ee60cfc214d3344a24b15d82ba355314aa7d5b695cd768a714547fc0c46fa874296502141cc6985817e32c806d9e4ef3593d7917418de59d683c1aed41769d0b80d5bcd3dbd0a41326e11d3611ef67e4144deec8ed84eea3ab3e0b8fd73f9514c1ad51e1", 0x84, 0x2, &(0x7f0000000100)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000280)=0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x300, 0x60) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000004000)={0x1, 0x0, 0x2080, {0x0, 0x11f000, 0x3}, [], "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", "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"}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000000000401, 0x40000000000004, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5280000000000000, 0x200) setsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, 0xfffffffffffffe94) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000100)) ftruncate(0xffffffffffffffff, 0xa3d2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f0000000480)={0x3, {0x0, 0x1c9c380}, 0x8, 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) fgetxattr(r2, &(0x7f0000000300)=ANY=[@ANYBLOB='bt2fs.\x00'], &(0x7f0000000380)=""/53, 0x35) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x0) 23:34:04 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000009f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000140)=0x68) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0xffffffffffffff60) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x442100, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x2b29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r2 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, r2, 0x800000000000, 0x0, r2) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f0000000400)=[{r3, 0x1040}, {r1, 0x102}, {r1, 0x4000}, {r1, 0x4000}], 0x4, 0x9) r4 = dup3(r0, r1, 0x80000) accept4(r4, &(0x7f0000000380)=@ipx, &(0x7f00000000c0)=0x80, 0x80000) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000500)={"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"}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@dev, @in6=@empty}}, {{@in=@loopback}}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) lchown(&(0x7f0000000940)='./file0\x00', r5, r6) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 560.624765] nla_parse: 13 callbacks suppressed [ 560.624810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:04 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000001c0)=')-\x1bO-\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e24, 0x2, @mcast2, 0x28c10efe}}, 0x9, 0x3, 0x52afc4d, 0xdb7b}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000700)=@assoc_value={r2, 0x5}, &(0x7f0000000740)=0x8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 560.776596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) splice(r0, &(0x7f0000000300), r2, &(0x7f0000000380), 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e00003ab523a088facf09cfb6555cce7f3aa31b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a9651856110000000000005da2df33a43fecdb81c0aa8c3d8c2178ee1937f6f30aff9c48e8d10759b99c"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:05 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400fbff000000009f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpeername$inet(r0, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x800) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000380)=""/183) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000200)={0x42, 0x1}, 0x10) [ 561.096620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 561.367111] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 1: r0 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='/dev/snapshot\x00', 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='&ppp0vmnet1\x00', r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0xba2ffaf5a9300, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x32, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4003, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000001c0)={0x2, r3}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, 0x0, 0xfdb6) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x1, 0x2, 0x4}}, 0x30) 23:34:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="2000000018002100fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296fa3487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e00"/122], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="aaa200"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80400, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x92cd, 0x0, [], {0x0, @bt={0x2, 0xfffffffffffffffd, 0x1, 0x2, 0x4, 0x4, 0x2, 0x8001, 0x7, 0x10000, 0x5, 0x0, 0x1, 0x0, 0x9, 0x9}}}) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000100)=""/98, 0x62}, {&(0x7f0000000380)=""/148, 0x94}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/58, 0x3a}, {&(0x7f0000000680)=""/248, 0xf8}], 0x6) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)={0x0, 0x0}) write$P9_RREMOVE(r3, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) r8 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$inet(0x2, 0x6000000000000001, 0x0) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r10, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) r11 = getpgid(0xffffffffffffffff) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r14, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r14, 0x800000000008982, &(0x7f0000000080)) r15 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r12, &(0x7f0000000940)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC=r8, @ANYRESDEC=r12], @ANYRES16=r5, @ANYRES64=0x0, @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR], @ANYRES16=r9, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESHEX=r5], @ANYRESOCT=r3, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESHEX=r12, @ANYPTR, @ANYRES64=r12, @ANYRES64=r11], @ANYRESDEC=r1, @ANYRESHEX=r0, @ANYRESHEX=r3], @ANYPTR64=&(0x7f0000000840)=ANY=[@ANYRESDEC=r6, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR, @ANYRESDEC=r13, @ANYRESDEC=r13]], @ANYRESHEX=0x0, @ANYPTR64=&(0x7f00000008c0)=ANY=[@ANYRESHEX=r2, @ANYRES32=r4, @ANYRES32=r1, @ANYRES16=r3, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYRESHEX=r7, @ANYRES32=r7, @ANYRESHEX=r15, @ANYPTR64, @ANYPTR64, @ANYRES64=r12], @ANYRES64=r2], @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYRES16=r7]], 0x44) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r12, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:05 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000440)) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x8, &(0x7f0000001600)=[{&(0x7f0000000500)="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", 0x1000, 0x668f}, {&(0x7f0000000140)="5eca8fa0d13d3cbf", 0x8, 0x100000001}, {&(0x7f00000001c0)="533aa78f9e0774e252aea3628530c2539384e080ff14b831d48fe296d4acd55af61f311991b000256c964a70a396791c44b632ff6a1bb8c1827766fcd558c0b733353cb989cad7235dc438b205d72c8e68e3c7f8efffe306fb0df0690e761464ae", 0x61, 0x80000000}, {&(0x7f0000000240)="3473b8ea00796d2b4cd076859198a5c117025aa38d98a1e617eaab334d45f97247bebc2904efb63a45b548cb0653a1e2c59527516ceb782f21f4738df355bd2319c96b95ff6855a27e3c885a7f775e6e4b8af39bdabf319625d64ff25931ca5e276159bc3aadfb353b", 0x69, 0x3}, {&(0x7f0000001500)="99b6f9d0658593b93e6c3ce9a0fac0a30c9192810457cdc18257726771109ad142bd0cf6df6ca74e4b48559657f1b5626d79de866428dbfb64082216b0305ea8f358a83645c2765cd8a56ca5718f98a9666d1448e65bf10873873c689f98e18ba665323af578e206eee5cc2cb199221ea8dcb72d31673bce465e91a5220c4411bc2d04cd5f0c3171b76dbbd43789f1091441adcd14171bee6ce2db61e6f6dbc95ed9aacd9d6443267ff00b2ab4a14a109b02fee4e2d7efb977228a8e5c9179ad6fcbf1e3d9c27e5a81a2ada6dfba7e216348ea9835a9cfafcf4910f6485db6fc2a56fef8", 0xe4, 0x6}, {&(0x7f0000000380)="69728ec8f318e108f99072ffe616b00c8c68bb5bc3564e9857254c76d9a4811a50e3d9c578dbee27dcc8979b1770e0ace42ad2eec5206da9910c1b753789c1187b3933f36cac34227540e0e3e71de91b46553a321747279b144152f46216b9890d60c72f3ab8087f5734307b5906d264e998b115ac64c27b24c3b22a5fd857bdc2dd95d7c966121b3a98c0", 0x8b, 0x2}, {&(0x7f0000002000)="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", 0x1000, 0x4}, {&(0x7f00000002c0)="51105e389f7e0cbb4f788b", 0xb, 0x4}], 0x0, &(0x7f00000016c0)='wlan1bdevppp0cgroupmvboxnet0cpuset,eth0em1selinuxwlan1keyring)securityself\'lo\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x100000000, 0x81, 0x6, 0x0, 0x0, 0x27, 0x400, 0x4, 0x0, 0x3, 0x0, 0x200, 0x1, 0xbe4, 0x9, 0x4, 0x1, 0x5, 0x6, 0xffff, 0x5, 0x6, 0xc9, 0x6, 0x7fff, 0x7, 0x81, 0x4, 0xad, 0x9, 0x100, 0x100000000, 0x2, 0x1, 0x3, 0xcd, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000001780), 0x1}, 0x10130, 0x401, 0xfffffffffffffffc, 0xf, 0x7, 0x1, 0x4a7}, 0xffffffffffffffff, 0x2, r0, 0x2) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001740)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000440)) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 561.983267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0000950000000000000000002000000000003d6d258a0ead"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303032353036342c6d6f64653d30313737373737373737373737373737373737373734342c6d6f64653d30303030303030303030303030303030303030373035332c6d6f64653d303030bfc575cca430303030313430303030303030303030303030302c6d6f64653d30301c30303030303030303030303030303030303030312c6d6f64653d30313737373737373737373737373737373737373736372c6d6f64653d30303030303030303030303030303030303030303030322c666f776e65723d", @ANYRESDEC=r1, @ANYBLOB=',context=user_u,\x00']) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e16c35aa50023047ced987ecb7dd5436bed62810b6", 0x76, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x400400, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1, 0x4) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000440)) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/339], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, r5, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd3350200674a137e9dafa28cd63296f23487b46bdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129ef77d85775e04bfdabd903d1bbd0f4450d21aa0bf669c"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), 0x0) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 562.394078] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x200, 0xc4000) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200)=0x6, 0x4) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind(r2, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'syz_tun\x00'}}, 0x80) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x20000, 0x0) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), 0x0) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000900)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000050}, 0xc, &(0x7f00000008c0)={&(0x7f0000000600)={0x2a8, r1, 0x200, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f00}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff00}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x153f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xbf}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x928}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc1b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x20000815}, 0x20008010) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000500)={'vcan0\x00', r3}) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8001, 0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @empty, 0x8}}}, &(0x7f0000000580)=0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e20, 0x13, @local, 0x1ff}}, 0x3, 0x8, 0x3, 0x80000000, 0x8}, 0x98) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 562.754369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:07 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), 0x0) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40000009f010000000000009500000000000000000000000ea6a6e022ad0892e16db72983a0a4cd49445cef45678c3840ed7fe955c82f68110459bf99869a1bfeb47792d07169148ece5eca0be46efcd051f19da107336cb2185fc30f6eae12399c96d8393fbaad1f12430c600d928bc61a7ad4e99a15c21e87ed92abc9472883b20f03673eea4e4a56249bab1051eade9afd22e8470d30f9201c1403898be90a585c4150fec173323d046f10f4f9d849a0fa32e2b73d10034ac09c48d696c7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x1ed, 0x0) r1 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f00000002c0)={0x0, 0x7, r1, 0x0, r2, 0x0, 0x2, 0x4}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x7, &(0x7f0000000380)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27ca06ad872554c03f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0beb8e8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae6900e200000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x90c01, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000540)={0x10000, 0xc3, 0x9}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000009500"/24], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x800, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000100)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = msgget$private(0x0, 0x200) msgrcv(r2, &(0x7f00000001c0)={0x0, ""/176}, 0xb8, 0x0, 0x800) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000400)=0x8) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ffff0000", @ANYRES16=r3, @ANYBLOB="01032bbd7000fcdbdf25010000000000000007410000001400180000000469623a6e6c6d6f6e30000000"], 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48000) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 563.199572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0xffffffffffffff9a) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 563.379115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3a, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000a00)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e000000040000003804000078020000780200005801000000000000680300006803000068030000680300006803000004000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002801580100000000000000000000000000000000000000000000000030006672616700000000000000000000000000000000000000000000000000000000000009000000ffff000000010000300061680000000000000000000000000000000000000000000000000000000000000007000004d2ff00000008020000300053455400000000000000000000000000000000000000000000000000000200000800862c021f020000000100010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f80020010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000000004d6000004d50000000000010000280053594e50524f58590000000000000000000000000000000000000000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280041554449540000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x498) r2 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(r1, 0x11, 0x68, 0x0, 0x4f) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x4, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000b40)='/dev/snd/pcmC#D#c\x00', 0x20, 0x208000) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000b00)={0x1, 0x7fff}) getsockopt(r1, 0x1, 0x3f, &(0x7f0000000200)=""/101, &(0x7f0000000280)=0x65) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) keyctl$invalidate(0x15, r2) r4 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x111400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000380)=""/171) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r5}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732eb715757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 563.598606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x1, 0xa0) semctl$SETVAL(r0, 0x7, 0x10, &(0x7f00000000c0)=0x8) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, 0x0, &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000000000009f0100000000f2009500000000000010540a2f33af80f0100f31b0693b63317fa5e9a36233be2b27bf8db865f5a72d644462dac788665092a346d4c06ebdc338374966efee3a836a470acfd97f9fab7c1a9e7b1f09214f89ff38ea7c0957fa039db686840f6f6f40955c68b1cdb68c4e5b09a0001128bf47b39cec112b959a3a29321e5231a978f58ba9261c58ec509a337b77757b5412693caf3f2b7d790e95c2de7fb16c9f18dc9a5159cfdf5a9e1e9f04157ee29388fa313058b9865c75525feade3ecb881af1bfe236fe142735958bfe63f0a040a7c0577ac650e10c"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockname$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000380)=0x1c) setsockopt$inet_udp_int(r1, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x202000, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000500)="9a6b1c047da365b8fe6f5a739abe779eb9e7323e8983a79465955428628d304f523d9962e0d2cf59718f26a45d6da975620b98f554708f5f17dd51eec5a481801674903dd42dde93866e130a50fb6a9e57b9dd4f8db3ec7191a376ebf447f1b0ae71e0bfa38b1e3b36862561e067fcf4a54bc5dd2ac25f7abeac675d0426bb884f9ad394ebe357c694881a6699310d833f6d3e46ab181531e3e64460384ca9de1db2fb73bb1d04541f3177544db71996f9e36b88827da9f2b25bb290f264109c0e083323", 0xc4, r0) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000840)=[{&(0x7f0000000600)="275d532688f7e6d214f76cf245198673ea611850d8", 0x15}, {&(0x7f0000000640)="afbdf75735f24d916a79e865e8eb4a726c9648af802ddcfb31a124d0caca735705161900accc9dcffb8b09a04a7d537989a64a3f68aec818e3a7c5ebd9130b7ef88a954b5c7612cb52c7d67afcbeb5f2006ce5d4f907055274b5c32e52974f26b8ddb3de05ea5e7e601653cc8a0fa10c8e29591cb92756f1c7cc970ae6752e5afc7004b761f144ce4971713fab8991bdc662f18fa56d9bd76e04471b4bca58dfe2d479a2109bb8d782d41660d0d4294bf9e54a9ead9b1c08", 0xb8}, {&(0x7f0000000700)="f870cf02864975b62f3d6618e42ccb75a461ca719161328b82a1b1eba24ebe8091d02847a6aef3e3055043ce60adea35f3c1253cfbef680bf09d5ff0c72d02dd9bf26c03197adc8700a3cefdb1782ae5b0235a333d55a07ed6e68c396eb21e8fc85389bf40bba550f8afc5e46829005dbe321f7f4ef27638c52213", 0x7b}, {&(0x7f0000000780)="fa7bc9e7fd193f8bb53be47992e1e66b14b82b4afaab6928b4f6b5c082e815b8ed30d7136eedc65d20c0d856355a0588813e96d99950bdeacdc47879700762fc037c0ccbf96914a74da1f8d6a05a947b4b732b707bca56bc89a054099f8ba6ae1c40cbb03ab0351b330b66f1b106902bdf94a633281c46a48656fab9842bf5abb0b3aae73ee8339bf5", 0x89}], 0x4, r0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000100)={0x5}, 0x4) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000008c0)={"1dfa507d8fa5aad5af6c55eb16634b9041fb874940a29421768e300b9d367346180f7ed9b16351c686661e56ca716d962f3acf55d1878b0cb914d0c9f7c2f130c8827aaf3b4f3220b6ec07b8f8084c3bb6e186d4260a85ad49654047291f34dc2003c0cdd02e37f8a781fdff05cc47846590b5d4b25a26200c2ca70e14528fa15319c25de1595ca6cf410533308ba6ac5209604cf055d303ce7145164002ee06a4c68a1e73f3baf18c09a69eb93d3b40364d3f7bfac2e151d5fdcb1c6bdd6e84963d89662cb0a20107046ef7047a46ef0de63e824fd42458655be417038b0cff7c3eb9894b775df51209104b5741382d4d7261b86d425e8048c758227d9049f9f7953a6ba6b6356257d5eec4c4e5cd142c69c5a85c727a2478bf070dc2993862f111cfb1953a88dfbf232a4c132dd6ee3e88de8060fbd807f6c4cc363af73de23a900441e632ba178e5bc6bc6c468072c199aac256e9421625062fd518a6f2822e7707c2cf1573919ee7c4310f572212771270c4e74b0abef84a50fbb17ef62d3488eae91207faa4f7f3b8e17cc6711e69a7a2819d9cfead9f7f06ea9b598c036a8429e09be3cc0cc9f0843dedc9fd69cf8bc4a45dfea8f6d5059c87852452f46c8147eae42377d807967fb33123cb9f5ca9ab762c8ad162d95e3ac8fc8dfc8585e6808e4039a1e8d1deccec7aff8f880c4838239df2c4ffede8aa6be0d28dac58beee2c0f2accffd45167e3c92bac89c4a8d0eaa1c1ea41c84987f454f0c561bb5f91e1ef01f9d01e314432036e49eb0cd950b7e5302fd8c8b489a4b8a97062dbc79c246edb8c3f6ed473130ec3af28931479f41557faea98b7493d8539579e6c11163a6701bff2827af246386337347db5c147656436e920cef26168829d3a21f6ec22273811902516a01a6c1e15256704ddbc719e14b4b9c8bdb0a46ef63aa0e457ddd0d0bcb59aa637fff2e89542e4f1594fea219115710938ad5c22a51d6d905995d295f65077d304a154cda8b7842155fa440b438404afa49306c0c51eb81e078dd08930a0a3df916b53a3394e8ee63370e4143d6f5916f40cef6805334f9666ab1758e45009948664a81c12c4f99739e8eef07ca2fca06dd2c037b043c64e0efc9b43c2f14636418c6f9bdfd248f9e2e1b514595e2c034948be0f6dc62ac6629b2e422641e2d8ffe1e5f0d6bed43d800a67cc5bd407c7f6f0a358bda6becd801faa4bba52bf867b0e23534e830731ba73ace12538b28988b5e071c529464d675781ee44f50c4b1b058f3e70dbc200764c1d00400755f14cdb11aa004fb66b46c4ee2cb5a30f808429f725e0b8d44ba6adc713e6e2bbc97b50a5e56ac3baebb429645db330fd363a47047e341d30dd5440e0dc54ee9ac8ceb6204afadd406f0b68023fb03a77bd91205a78df2fc55ba0a42acf37cf1faac92dc5dfa6a4"}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000880)) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed628", 0x81, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, 0x0, &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)={0x0, 0x0}) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x6000000000000001, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r8, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f0000000300)=ANY=[@ANYRESDEC=r3, @ANYRES64=r0, @ANYRESOCT=r7], 0x0, 0x0, 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, 0x0, &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000001c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f0000000300)={0x7, 0x7b, 0x1}, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x820000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="20001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9060000000000000013732ebf23757078d0f4be6284ca8991f3cd3cd3353540cb2222033b681587fe8f3d097ed5937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129eb742ce607eee0879fed230b264fd4a2502"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x5) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:08 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', 0x0, 0x0) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000007f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r1 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) keyctl$unlink(0x9, r1, r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000002c0)={0x7, 0x3, 0xfffffffffffffffb, 0x23, &(0x7f0000000100)=""/35, 0xd2, &(0x7f00000001c0)=""/210, 0x5, &(0x7f0000000140)=""/5}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:08 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', 0x0, 0x0) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005b81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f03487b4ebdf1b8bfc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', 0x0, 0x0) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0000009f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b0", 0x41, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r3, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x6000000000000001, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r7, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) r8 = getpgid(0xffffffffffffffff) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x9) ioctl(r10, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r11 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000001040)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r5, @ANYRES64=r4], @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r11, @ANYRESDEC=r8, @ANYBLOB="67b534d89616f98c532e9f3888d2d653954b952676e3897a638a952dd594bcda3a57ff4e7c0cb8b0547c0c24bd02241ba53ced424bc274b63ce6789aaae05791e08bc41afaf7b084aa492d640028131e112c48c8763b608838808bd80abe99027b8ed22121fc5d8946fb58a229593b67fb801cfe43931cffee69f7f4e8ebf24ddae0a1b0b34d09e41a8b8e268f0678552486bbdb3b98174c8f244db5748d74168b4bc48bdf194f9e6d21c207ed7a53899f81645007b05546e857f2c78a7fbfe44a029a719d2bc9cc70e4ca03f57e103b36a4d459e9295ba918a8350e398852c83bc1ac4347d886d9b1688bbad3c43820b2"], @ANYBLOB="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"], 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x12, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:09 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) getpgid(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r4, r4, &(0x7f00000000c0)=0x206, 0x4) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b0", 0x41, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000001c0)=ANY=[@ANYBLOB="b49358c757413106df2c4d80e7107565dc105a5fbbaa902bf40095c5b70c18a80c59a000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r3 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, 0x0) keyctl$reject(0x13, r3, 0x800000000000, 0x40000000003, r3) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000240)={r4, 0x1}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = syz_open_pts(0xffffffffffffffff, 0x440000) ioctl$TCSBRKP(r5, 0x5425, 0x57d) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40180, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f0000000500)="902f3a993a1cb95988e9ad8faa8f5b1066bad40ef304ac033e05da89618ac4fc6ad23feb6febcb982a64fc872cf4440fb13287f78e6711bc8e1c575f28359514dccbfe223ffa4a39b8c0a72c98f0c4bc7ae80c457dd748d5b7bd48340e44243336f6cfd97f1b959811bf0b40d652b91aec558d4374c78ae79620bcf940d8377786c8330bffe98264c127d0c21b37288a2a4861b43a38f2b29ec07db3a5b52091d6f995deb61f1906319e3258d71e4fa766ca11bbb4659130d3d7a11828b0ad71861b824c08f63b2d5b65cfde3be80deea426828520db7b6f91c7bb69d58b70ad") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='GPL\x00', r2}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x5, 0x30}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000380)={r7, 0x1ff, 0x0, 0x9}, &(0x7f00000003c0)=0x10) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b0", 0x41, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) getpgid(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r4, r4, &(0x7f00000000c0)=0x206, 0x4) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4220000000002009f010000000000009500000000000002"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x100, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x400, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x82000, 0x0) socket(0x10, 0x807, 0x8) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x200, 0x0) getpeername$inet(r2, &(0x7f0000000500)={0x2, 0x0, @dev}, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x63, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) write$sndseq(r1, &(0x7f0000000540)=[{0x1f, 0x6, 0x1ec, 0x9, @tick=0x1, {0x9be, 0x9}, {0x0, 0x20}, @result={0x5}}, {0xc2, 0x74, 0xfffffffffffeffff, 0x0, @time={0x77359400}, {0x5, 0x2}, {0x4, 0x7}, @note={0x55cc, 0x2, 0x8, 0x1ff, 0x2}}, {0x4, 0x3ff, 0xfffffffffffffff9, 0x401, @tick=0x9, {0x1}, {0x8, 0x5}, @addr={0x200, 0x10000}}, {0xa6ac, 0x4, 0x2, 0x7ff, @tick=0x80, {0xffc0000000000000, 0x8}, {0x113, 0x3}, @quote={{0x6, 0x7f}, 0x8000}}, {0x2, 0xa618, 0x6, 0x3ff, @time, {0x3, 0x5}, {0x80, 0xffffffffffff5065}, @note={0x7ff, 0x5, 0x30000000000000, 0x200, 0x1f}}, {0x8923, 0x1201, 0x9, 0x3, @tick=0x3ff, {0x46e14364, 0x3ff}, {0x0, 0x100000001}, @time=@tick=0x2}, {0x2, 0x7f, 0xf665, 0x4, @tick=0xe84, {0x3, 0x9}, {0x7, 0x1}, @result={0x9, 0x80}}], 0x150) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000001800001c140000fe0000010000e7ff03001afb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa704000000000000b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e2ad7e0450fad1c1b1c5163b75e00a4e6d14782c871fb5deab3c0000000000000000000a44159e4de7f367657d27a0220c58c3b1867c9c903000000000000000a777aec2e5ec056e16a8ca48114f8fc9cdab3683afaaad00901912a93d00a36c8f870a0a9e7af43c3f0c35a29182d56ea4429d01f799abd3044688a3b6e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905", 0x61, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0xfffe, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) getpgid(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r4, r4, &(0x7f00000000c0)=0x206, 0x4) 23:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905", 0x61, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) socketpair(0x7, 0xa, 0xfffffffffffffc01, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x60, 0x80000) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0xfffffffffffffe18) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905", 0x61, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x1000000000067, 0x0, 0x79) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc00, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2800000004000, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 566.034693] nla_parse: 8 callbacks suppressed [ 566.034730] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 566.205614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)={0x0, 0x0}) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x2, 0x6000000000000001, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r8, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r10, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0x100000000ffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x1a, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[], @ANYRESHEX=r3, @ANYRES64=r4, @ANYRESOCT=r0, @ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRESOCT=r1, @ANYBLOB="ab9dd7933a3b20fe299b1df5634e91b1f57a5c4b27db248dd0826cd78f257c48863024eb35c229ed28538e8ce98c5e1c065b3d68d4090444cb2d86218e0a78f8f1756b2e516c1e6ea303ad0c27325cb15a5d24afc7de42e88d99886bcaebd71435637f1bb824fc8f095008dfdf2f9abca6931daea6d93b9049d8c885c2baf0678e1b6fb973a99c1a22192de5087c0fc591ef891c43dbc92cc235426ae473e844dcc4"], @ANYRESOCT, @ANYRESHEX=r6, @ANYRESDEC=r5, @ANYRES64=r6, @ANYRES32=r3], 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(r0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @dev={[], 0x26}}, 0x0, {0x2, 0x4e23, @multicast2}, 'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/253) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$packet(0x11, 0x3, 0x300) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 566.483517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 566.618651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x14, 0x1a202) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0xfffffffffffffec6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000380)={0x200, 0x1, {0xffffffffffffffff, 0x3, 0xde, 0x0, 0x6}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@remote, 0x4e24, 0x8, 0x4e21, 0x7, 0xa, 0x80, 0x20, 0x0, r1, r2}, {0x9, 0x7fffffff, 0x5, 0x6, 0x8001, 0x8, 0x2, 0x3}, {0x10000000000000, 0x6, 0xb, 0x800}, 0x0, 0x6e6bb8, 0x3, 0x1, 0x3, 0x1}, {{@in=@empty, 0x4d4}, 0x2, @in=@multicast2, 0x3506, 0x0, 0x2, 0x3, 0x6, 0x4, 0x1}}, 0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) creat(&(0x7f0000000280)='\x00', 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000002c0)=0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6f, 0x101000) getsockopt$nfc_llcp(r0, 0x118, 0x7, &(0x7f0000000100)=""/91, 0x5b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 566.875199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 567.014591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(r0, &(0x7f0000000300)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00\x006b\x8bA\xfb\xff\xff\xff\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xffffffffffffffb5) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061", 0x42, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9}, &(0x7f00000001c0)=0xc) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000240)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061", 0x42, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000140)={0x3, r1}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061", 0x42, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 567.271688] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:11 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/339], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="2000000018002100000000000053fb001c140000fe000001bc1f6297e8000b1ef8d6af715200000000005a81eb15c7c8a9611508dce780faf313732ebf23757078d0f4be5784ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd41b7e55ce1033ced2000a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x1000, &(0x7f0000000140)=0x2) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e114", 0x63, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e114", 0x63, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35", 0x71, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x2000000002006e, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa500230", 0x75, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 567.656005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 567.773054] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e114", 0x63, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400006b4ec1aad3a3dbd6000000000095edd43b00000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa500230", 0x75, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:11 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:11 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000580)=ANY=[@ANYBLOB="20000000180000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15ffff00000000000080faf313732ebf237570eeaf8556df564760a897e794b6bad09578d0f4be6284ca9fa7f0a3807fd02c7967cc7bc0da1c137e9dafa28cd63296f24b212821bd4eb7e55ce1030000000000000000"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa500230", 0x75, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50", 0x73, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x201, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x6, 0x8) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x5}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="2900000006000f0000000500004000000400000000000000000000000000000069127f0f1f4cb25800000000001021b0c9d86ea050325f77727e71405b57a5ecf7ae7b1562bff4c99eef500ade32c473684a8645e6b024020f322903f5bad93ae70100b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d0c7afe27cbf6ad872554c11f2d718a063a44b44a701c9d350cfcc68c9b06cfb20478fd4dcdc7e27c00ce89799d4bd6ee9fe8b34ad5117fe175bd2879a6f813f09bae8ded663b62f0b058f8e040000000000003ab523a088facf09cfb6555cce7f3aa21b5721aa795e7927a0e2caa0a0ef5947901cdd2179958014ac2a6521e785449a7b0949f4d086c1470c1f00000000000000ac20c97996c45194ca3172b5c1a171b3e59d16b5e8a7c684635c7588d96ee383f7ff6bcacfb9cae2c4eeefc399b4ae69000100000000000000e0a965185611000000000000"], 0x153) mount(&(0x7f0000000c00)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25a4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa8959db5ccc786572f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece02000000f3a2331c0a9e5e6d637bd6ddc7e3d6d9255e7b138adc36c57891f82dea1d98f3c488fd16dcf49c4ffd5404d177fe18000000000000"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50", 0x73, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x0, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000095000000000000000000a4ad17c8cc963e16d44d94bc0000000000000021000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 568.275617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 23:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50", 0x73, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0100521a4600"/24], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x0, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f0000000300)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10, 0x0, 0x0, 0x10000}, 0xfffffffffffffe89, &(0x7f000000b000)={&(0x7f0000000580)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7", 0x7b, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000002c0)=0x314) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='lkbon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) 23:34:12 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x0, 0x1, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x70) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RUNLINKAT(r2, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7", 0x7b, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced9", 0x78, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7352abd1b126e8d4fa0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:12 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x0, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000009f010000800000009500000000000000c9b4d956a3d18423bc98d17fd19d12fed1c257df0f4caa3ca802f594ede790e6b9b34801acf1e78ee2cbb11fd68095393d6734ad15f50862d7fdb5463949021947ddf84048727452e3b8"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000240)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0x40000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0xfffffffffffffff9, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x40000002e, 0x0, 0xffffff13) openat$ptmx(0xffffffffffffff9c, 0x0, 0x100, 0x0) 23:34:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced9", 0x78, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7", 0x7b, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x0, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced9", 0x78, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="d53d", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x814, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f0000000380)={0x1, {0x0, 0x989680}, 0x5}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r6, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) close(r6) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x7) 23:34:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x0, 0x3f}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x800000b, 0x0, 0x425) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436be", 0x7f, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 569.352759] INFO: trying to register non-static key. [ 569.358377] the code is fine but needs lockdep annotation. [ 569.364009] turning off the locking correctness validator. [ 569.369968] CPU: 0 PID: 20702 Comm: syz-executor.5 Not tainted 4.14.137 #33 [ 569.377444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.387021] Call Trace: [ 569.390155] dump_stack+0x138/0x19c [ 569.394145] ? vprintk_func+0x65/0x159 [ 569.398190] register_lock_class+0x2fd/0x1730 [ 569.402853] ? check_noncircular+0x20/0x20 [ 569.407107] __lock_acquire+0x147/0x4620 [ 569.411451] ? __lock_acquire+0x5f7/0x4620 [ 569.415698] ? save_trace+0x290/0x290 [ 569.419519] ? trace_hardirqs_on+0x10/0x10 [ 569.424863] ? trace_hardirqs_on+0x10/0x10 [ 569.430348] ? save_trace+0x290/0x290 [ 569.434789] ? lock_downgrade+0x6e0/0x6e0 [ 569.439256] ? finish_task_switch+0x178/0x650 [ 569.443763] ? find_held_lock+0x35/0x130 [ 569.447925] lock_acquire+0x16f/0x430 [ 569.451843] ? flush_work+0x84/0x730 [ 569.455661] flush_work+0xae/0x730 [ 569.459370] ? flush_work+0x84/0x730 [ 569.463098] ? insert_work+0x320/0x320 [ 569.466999] ? finish_task_switch+0x178/0x650 [ 569.472160] ? finish_task_switch+0x14d/0x650 [ 569.476908] ? mark_held_locks+0xb1/0x100 [ 569.481260] ? __cancel_work_timer+0x166/0x480 [ 569.486034] __cancel_work_timer+0x2f0/0x480 [ 569.490441] ? cancel_delayed_work+0x20/0x20 [ 569.494936] ? retint_kernel+0x2d/0x2d [ 569.498842] cancel_work_sync+0x18/0x20 [ 569.502848] smc_close_active+0x68e/0xba0 [ 569.507151] smc_release+0x45a/0x630 [ 569.510884] __sock_release+0xce/0x2b0 [ 569.514964] ? __sock_release+0x2b0/0x2b0 [ 569.519269] sock_close+0x1b/0x30 [ 569.522921] __fput+0x275/0x7a0 [ 569.526212] ____fput+0x16/0x20 [ 569.529512] task_work_run+0x114/0x190 [ 569.533590] exit_to_usermode_loop+0x1da/0x220 [ 569.538189] do_syscall_64+0x4bc/0x640 [ 569.542254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.547288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 569.552721] RIP: 0033:0x459829 [ 569.556030] RSP: 002b:00007f520df67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 569.563856] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459829 [ 569.571406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 569.578853] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.586173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f520df686d4 [ 569.593442] R13: 00000000004f8e32 R14: 00000000004d19d0 R15: 00000000ffffffff 23:34:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436be", 0x7f, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:13 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 569.604504] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env [ 569.626857] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 569.714839] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 569.763613] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 569.776920] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 569.778045] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 569.786654] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 569.792268] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 569.853486] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 569.860393] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x400, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436be", 0x7f, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000004eafb505334094bf0cfe3e44eb000000000000000000000000000000000000000000010000006f0300000e020000000000000100000000000000000000000000000034000000000000000000000000000000000000000000000000000000000000000600000000000000006365000000000009000000000000000600"/256]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', 0x0, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, r0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3, 0x400000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 569.900459] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 569.906748] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 569.926963] kobject: 'loop5' (ffff8880a4b3b320): kobject_uevent_env [ 569.943472] kobject: 'loop5' (ffff8880a4b3b320): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f00000000c0)=ANY=[@ANYBLOB="b41200000000001aec5f2c3926909a7928adebc4b7b40655425d121e534d7b009f010000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 569.982935] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7", 0x7b, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1}, 0x20) sendfile(r5, r5, &(0x7f00000000c0)=0x206, 0x4) [ 570.038484] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 570.068088] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env [ 570.094280] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 570.098593] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7", 0x7b, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.139221] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 570.171479] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 570.201512] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 570.213373] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.219665] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 570.244408] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 570.251559] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 570.278252] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.284740] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0x297, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x6) sendto(r0, &(0x7f00000001c0)="c0e67364bf1864c425384017e891a3f11b66e0fea64ad5ada88606109c464611ccd7600f93bf2938a72ac953c9afa2d8d28195eb64ac9f70dc40292b3f9ebcf253d1ffd485c7eac635e9ceaaca1d3fc4d0a970b0c81a6744bc9b146386e02840f201365868e1e2a39c210d03bd7c3bfd2cc053a1bba16761d789c7c4cac01a8f5a2808dc9388c6fd51bebf40bef39e79f0bad4997536575d72da7b454cf768de590fed7b31c314be8a02641f5cb23d58bae1bd7aad1b97a6f3b281b210e6d26f86c9e3de85cc7bea0669dcf6f57835c4cd3abffd43e27a23e6fd7e9fe915", 0xde, 0x1, &(0x7f0000000380)=@rc={0x1f, {0x2, 0x10000, 0x100000001, 0xff, 0x4, 0x1}}, 0x80) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.338296] kobject: 'loop5' (ffff8880a4b3b320): kobject_uevent_env [ 570.352425] kobject: 'loop5' (ffff8880a4b3b320): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.419335] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.435655] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env 23:34:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x1, 0x3, 0x8, 0x1, 0x8, 0x0, 0x8000, 0x8001, 0x7, 0x10001, 0x1}, 0xfffffffffffffeb9) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.460168] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 570.483080] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:14 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.515545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20811 comm=syz-executor.5 [ 570.549108] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 570.610198] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.615485] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 570.616802] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 570.673801] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 570.680332] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 570.691235] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env [ 570.697881] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 570.711021] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.719830] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 570.744006] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.750697] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x400, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000e00000/0x200000)=nil, 0x200000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ce", 0x77, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0)=0x206, 0x4) 23:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000200)=0x90012) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x840, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000140)={0x1d, &(0x7f0000000100)="13f750aba1e538d951237d4ec3d6e344f9204ee97dfe4da16a43beacef"}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.808473] kobject: 'loop5' (ffff8880a4b3b320): kobject_uevent_env [ 570.824352] kobject: 'loop5' (ffff8880a4b3b320): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.857038] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 570.898707] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, 0xffffffffffffffff, &(0x7f00000000c0)=0x206, 0x4) 23:34:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) [ 570.942445] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env [ 570.951601] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.994969] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 571.002836] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.016783] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 571.050121] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 571.079974] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 571.098035] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 571.115555] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.122957] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 571.145842] nla_parse: 6 callbacks suppressed 23:34:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="0f42", 0x1cf) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r2, &(0x7f0000000380)={0x7, 0x7b, 0x1}, 0xfffffffffffffe95) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000001800210000000000000000001c140000fe0000010000e7ff030009fb3ca440325200000000005a81eb15c748a9611508dce780faf313732ebf23757078d0f4be6284ca8991f3cd3cd335937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) ioctl$KVM_GET_MSR_INDEX_LIST(r5, 0xc004ae02, &(0x7f0000000300)={0x2, [0x0, 0x0]}) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) [ 571.145848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.164406] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.176332] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:15 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, 0xffffffffffffffff, &(0x7f00000000c0)=0x206, 0x4) 23:34:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9dc7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0d, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2206, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b, 0x10, &(0x7f00000000c0)}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x8, 0x400) 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 571.229439] kobject: 'loop5' (ffff8880a4b3b320): kobject_uevent_env [ 571.244315] kobject: 'loop5' (ffff8880a4b3b320): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:34:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) [ 571.291955] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env 23:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, 0xffffffffffffffff, &(0x7f00000000c0)=0x206, 0x4) [ 571.335852] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 571.337615] kobject: 'loop3' (ffff8880a4a4d220): kobject_uevent_env 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 571.386678] kobject: 'loop3' (ffff8880a4a4d220): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 571.411272] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.432654] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 571.471164] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.477733] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 571.500818] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 571.524540] kobject: 'loop2' (ffff8880a4a42920): kobject_uevent_env [ 571.531364] kobject: 'loop2' (ffff8880a4a42920): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 571.555424] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.562043] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:15 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0x3, &(0x7f0000000240)) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r5, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x153) mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="cb2b9b5055175d43fca389e340fe96132329a39f9214ef505217695a040000007ee9df5f70f2c901b0443d5bc274a1f1576385a885b764dc4bab000000000000f32605fbb40acfad0fe7c80493e49ba14620b9ce91fe2210273cba5c743c43d01bf6c0523b7c01d8f6d05182c3c4fa95a918e64e76ecdbf643831e56a1a2b6a7ddf33a0993c1e6a73725783b1f37b0d9a9e25b4c86556de5dcfe4db16e4519c447476c04a7ac02a3fefc3f947e07d5f9e8b59e98f5db6b95b47d65af66aa458cdef6248ddbc74add2b9408f0bc4ef800696716d69ff7110e40ebba7dac3c8a44dda4c0d4e6457c1930ef1f0e89a4e4f5b6d9451d5b82a6171ca1ae84b1ec610933d7d0223f9bb05485fb7d43b539a755d7eb2b4f2880b9aa841ba7f59cd7478458f18159bbba09c11985bb380e3f2ef9ea900e66e4d204134f75e7bdc5cad74dd34eb0c1d7676eb42f99f56f651a21ce264d6900d9caf430bc0204da8037a13c6805d70932fa57ddf1b09034e2f00ed4bac45fc683e64150f270d358dfa777baddbc8e9cd5e825065cb285c008c904ce6012cd14d5853650fc8d4b6785de9307406e87b3672910e081b148e0aa89f0648cc82398e82d2d5c8bd5882d0eb815719b900167a2cece2682d920f3"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000001800210000000000000000001cf0ae00fe0000010000e7ff030009fb3ca440325200000000009c7eebc017dd0b7a95179c000000000000001508dce780faf313732ebf23757078d0f4be6284ca8991f3871ac6a1937967cc137e9dafa28cd63296f23487b4ebdf1b71fc4b212821bd4eb7e55ce1033cedf142a0f3540c19129e"], 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 23:34:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ecb7dd5436bed62810b6", 0x83, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987ec", 0x7a, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 571.577860] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.589139] kobject: 'kvm' (ffff8880a87da150): kobject_uevent_env [ 571.596000] kobject: 'kvm' (ffff8880a87da150): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:34:15 executing program 2: rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0xffffffffffff, 0x7fffffff) ioctl(r0, 0x1, &(0x7f0000000140)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0xffffffffffffff7f, 0x100000000, 0x6, 0x100000001, 0x0, 0x0, 0x10000, 0x4, 0x851, 0x3f, 0x7, 0x0, 0x0, 0x8, 0x54792ef6, 0x4, 0x7f, 0xff, 0x5, 0x401, 0x9, 0x5a, 0x3f, 0x9, 0x6, 0x5, 0x7, 0x0, 0x2, 0x1, 0x0, 0x55e, 0x80000000, 0x7fff, 0xfffffffffffff746, 0x101, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8801, 0x4, 0x1ff, 0xf, 0x40, 0x0, 0x5}, r1, 0x0, r1, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x212f7566) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800007, 0x1013, 0xffffffffffffffff, 0x3) remap_file_pages(&(0x7f000054d000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x0, 0x3) mremap(&(0x7f000042b000/0x4000)=nil, 0x4000, 0x4000, 0xffffffffdffffffa, &(0x7f0000ab0000/0x4000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) fcntl$setlease(r0, 0x400, 0x0) rmdir(&(0x7f0000000000)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffef7) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r3, 0x29, 0xd3, &(0x7f0000000480)=0x5, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x3, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) prctl$PR_MCE_KILL_GET(0x22) clock_nanosleep(0x0, 0x1, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x8, 0x7fffffff, 0x98f, 0x6}) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000440)=0xffffffffffffffde) fgetxattr(r1, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/175, 0xaf) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @remote}, 0x7f1, 0x0, 0x0, 0x8, 0x1, 0x3f}, 0x20) sendfile(r5, r5, 0x0, 0x4) 23:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000440)="74ce6ec4b1dc2c3d3561f12307fbad6a8ec894833456599d3c2dbfdfcbb767fad3627e624ebe1d4a88a4001e282f820d6617852f677b67e09d905af3df835329b061128573f7294dc36b6bb1903f633cca8428abdcc4088cc6bc94532ccff81905e1140a93bb08d60a6feee44bc93d6c35aa50023047ced987", 0x79, 0xfffffffffffffffc) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB]) keyctl$reject(0x13, 0x0, 0x800000000000, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000336, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff6b}, 0x48) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0,