0000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:17 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:17 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(0xffffffffffffffff, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:17 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0x0, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:17 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:18 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:18 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:19 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:19 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:19 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(0xffffffffffffffff, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:19 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0x0, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:19 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) getpgid(0x0) 22:18:19 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:19 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:19 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:19 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) getpgid(0x0) 22:18:19 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) r4 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r4) 22:18:19 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:20 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) r4 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r4) 22:18:20 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:22 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:23 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:23 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:23 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) r4 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r4) 22:18:23 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:23 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:24 executing program 1: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:18:24 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) r3 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r3) 22:18:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:18:24 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:24 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:24 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r3) 22:18:27 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:27 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:27 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) r2 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r2) 22:18:27 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:27 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:27 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:27 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:28 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:28 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:28 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:28 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) r1 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r1) 22:18:28 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:28 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:28 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:29 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:30 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r1) 22:18:30 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:30 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:30 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:30 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:31 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:32 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:33 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:18:33 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:33 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:33 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:33 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:33 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:33 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) 22:18:34 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:34 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:34 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:18:35 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:35 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:18:35 executing program 5: r0 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:35 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:35 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:35 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:35 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:36 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) 22:18:37 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) 22:18:37 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:37 executing program 5: r0 = syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:37 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) 22:18:37 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:37 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:38 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:38 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:38 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:38 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) 22:18:38 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:38 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:38 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) getpgid(r5) 22:18:38 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:38 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:38 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:40 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:41 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:41 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x0, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) 22:18:41 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r4, 0x1, 0x1) 22:18:42 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:46 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:46 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) fsmount(r4, 0x1, 0x1) 22:18:46 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:46 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:49 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:49 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:49 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:49 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) fsmount(r4, 0x1, 0x1) 22:18:49 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:49 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:49 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) 22:18:49 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:49 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) fsmount(r4, 0x1, 0x1) 22:18:49 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:50 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:50 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:50 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:50 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0x0) 22:18:50 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:50 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:50 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:50 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:50 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:51 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:51 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:51 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:51 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:51 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0x0) 22:18:51 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:51 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:51 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:51 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0x0) 22:18:51 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:52 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:52 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:53 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:53 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:53 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:53 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663d", 0x31, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:53 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:55 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:55 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:55 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663d", 0x31, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:55 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:55 executing program 1: fsmount(0xffffffffffffffff, 0x1, 0x1) 22:18:56 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x1) 22:18:56 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:56 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:57 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:57 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) 22:18:57 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663d", 0x31, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:18:57 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:57 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:57 executing program 1: r0 = syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:57 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:58 executing program 1: r0 = syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:58 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:18:58 executing program 1: r0 = syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") getpgid(r0) 22:18:59 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:59 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) 22:18:59 executing program 1: syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:18:59 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:59 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:18:59 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25f", 0x4a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:00 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:00 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) 22:19:00 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) 22:19:00 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:00 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:00 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:00 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:00 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25f", 0x4a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:00 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:00 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:00 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:00 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:19:01 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:01 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) 22:19:01 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:19:01 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:02 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:02 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:03 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:03 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:03 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:03 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:03 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:03 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25f", 0x4a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:04 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:04 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:04 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:04 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:04 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:04 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:04 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:05 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8", 0x56, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:05 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:05 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:05 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:06 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:06 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:06 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:06 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:06 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:06 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:19:06 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8", 0x56, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:07 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:07 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) 22:19:07 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:19:07 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:08 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:19:09 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:19:09 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:09 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:09 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:09 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:09 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) 22:19:11 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8", 0x56, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:11 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:11 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:11 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:11 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:11 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:11 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:12 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:12 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:12 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:12 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:12 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:14 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c", 0x5c, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:14 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:14 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:14 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:14 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:15 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:15 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:15 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:15 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:15 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:15 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:15 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c", 0x5c, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:16 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:16 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:17 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:17 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:17 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:17 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:17 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:17 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c", 0x5c, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:18 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:18 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:18 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:18 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:19 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:19 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:20 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:20 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:20 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) getpgid(r5) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:20 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:20 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:22 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:22 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:22 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:23 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:23 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:24 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:24 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:24 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r4, 0x1, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) [ 513.006246][ T37] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.131483][ T37] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.248973][ T37] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.357422][ T37] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 514.200408][ T37] hsr_slave_0: left promiscuous mode [ 514.234708][ T37] hsr_slave_1: left promiscuous mode [ 514.254537][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 514.262045][ T37] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 514.316430][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 514.323918][ T37] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 514.366578][ T37] bridge_slave_1: left allmulticast mode [ 514.372384][ T37] bridge_slave_1: left promiscuous mode [ 514.378254][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.416757][ T37] bridge_slave_0: left allmulticast mode [ 514.422471][ T37] bridge_slave_0: left promiscuous mode [ 514.428190][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.498423][ T37] veth1_macvtap: left promiscuous mode [ 514.503998][ T37] veth0_macvtap: left promiscuous mode [ 514.509614][ T37] veth1_vlan: left promiscuous mode [ 514.514936][ T37] veth0_vlan: left promiscuous mode [ 514.744468][ T37] team0 (unregistering): Port device team_slave_1 removed [ 514.758368][ T37] team0 (unregistering): Port device team_slave_0 removed [ 514.770527][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 514.869900][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 514.920695][ T37] bond0 (unregistering): Released all slaves [ 515.536196][T17985] chnl_net:caif_netlink_parms(): no params data found [ 515.849826][T17985] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.857008][T17985] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.886050][T17985] bridge_slave_0: entered allmulticast mode [ 515.925323][T17985] bridge_slave_0: entered promiscuous mode [ 515.940695][T17985] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.947779][T17985] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.996051][T17985] bridge_slave_1: entered allmulticast mode [ 516.007085][T17985] bridge_slave_1: entered promiscuous mode [ 516.078284][T17985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 516.129280][T17985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 516.216942][T17985] team0: Port device team_slave_0 added [ 516.223444][T17985] team0: Port device team_slave_1 added [ 516.299004][T17985] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 516.306064][T17985] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.332156][T17985] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 516.446628][T17985] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 516.453633][T17985] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.479783][T17985] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 516.667902][T17985] hsr_slave_0: entered promiscuous mode [ 516.676395][T17985] hsr_slave_1: entered promiscuous mode [ 516.685937][T17985] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 516.693483][T17985] Cannot create hsr debugfs directory [ 517.259571][T17985] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 517.308164][T17985] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 517.346047][T17985] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 517.376144][T17985] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 517.483531][T17985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 517.510477][T17985] 8021q: adding VLAN 0 to HW filter on device team0 [ 517.546806][ T3188] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.553940][ T3188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.576907][ T3188] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.583961][ T3188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.659663][T17985] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 517.792207][T17985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 517.952579][T17985] veth0_vlan: entered promiscuous mode [ 517.988622][T17985] veth1_vlan: entered promiscuous mode [ 518.040445][T17985] veth0_macvtap: entered promiscuous mode [ 518.067705][T17985] veth1_macvtap: entered promiscuous mode [ 518.110416][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.121042][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.130899][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.141427][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.151261][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.161739][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.171569][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.181996][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.191816][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.202316][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.230273][T17985] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 518.251901][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.262539][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.272377][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.282807][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.292668][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.303091][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.312892][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.323390][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.333261][T17985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.343697][T17985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.367333][T17985] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 518.417060][T17985] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.425897][T17985] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.434646][T17985] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.443620][T17985] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 22:19:31 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:31 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e57266", 0x30, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:31 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:31 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:31 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:31 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:32 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:32 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:32 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:32 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad4", 0x61, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:32 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:32 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:32 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:33 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e57266", 0x30, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:33 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:33 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:33 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad4", 0x61, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:33 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:33 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:34 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:35 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:35 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:35 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) getpgid(r5) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:35 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad4", 0x61, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:35 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e57266", 0x30, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:36 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:37 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:37 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:37 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6f", 0x48, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:38 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:38 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:38 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r4, 0x1, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:38 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:38 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:38 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:38 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6f", 0x48, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:38 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:38 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:39 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r4, 0x1, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:39 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r4, 0x1, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6f", 0x48, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:40 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:40 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:42 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:42 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), 0x0) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:42 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:42 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:42 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r4 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:42 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c9", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:43 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:43 executing program 1: add_key$user(0x0, &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:43 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), 0x0) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:43 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) r4 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:43 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:44 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:44 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c9", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:44 executing program 1: add_key$user(0x0, &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:44 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), 0x0) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:44 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:45 executing program 1: add_key$user(0x0, &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:45 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:46 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:46 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) r4 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:46 executing program 1: add_key$user(&(0x7f0000000880), 0x0, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:46 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:46 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:46 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c9", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:47 executing program 1: add_key$user(&(0x7f0000000880), 0x0, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:48 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:48 executing program 1: add_key$user(&(0x7f0000000880), 0x0, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:19:48 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:48 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:48 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:48 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) r4 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:48 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:48 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771", 0x5a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:49 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:49 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:49 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) r4 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:49 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:49 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771", 0x5a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:50 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:50 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) r3 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r3, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:51 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:52 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:52 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:52 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:52 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771", 0x5a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:52 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r3, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:52 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:19:52 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:53 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:19:53 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:53 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d", 0x5d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:53 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 540.607201][T15595] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 540.715202][T15595] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 540.783370][T15595] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 541.034537][T15595] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 22:19:55 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d", 0x5d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:19:55 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:19:55 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r3, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:19:55 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 542.117126][T15595] hsr_slave_0: left promiscuous mode [ 542.128030][T15595] hsr_slave_1: left promiscuous mode [ 542.156960][T15595] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 542.164443][T15595] batman_adv: batadv0: Removing interface: batadv_slave_0 22:19:55 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) [ 542.206230][T15595] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 542.213725][T15595] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 542.254333][T15595] bridge_slave_1: left allmulticast mode [ 542.260042][T15595] bridge_slave_1: left promiscuous mode [ 542.265727][T15595] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.295947][T15595] bridge_slave_0: left allmulticast mode [ 542.301641][T15595] bridge_slave_0: left promiscuous mode [ 542.307363][T15595] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.365255][T15595] veth1_macvtap: left promiscuous mode [ 542.370802][T15595] veth0_macvtap: left promiscuous mode [ 542.376380][T15595] veth1_vlan: left promiscuous mode [ 542.381602][T15595] veth0_vlan: left promiscuous mode [ 542.917327][T15595] team0 (unregistering): Port device team_slave_1 removed [ 542.948858][T15595] team0 (unregistering): Port device team_slave_0 removed [ 542.995571][T15595] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 543.027877][T15595] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 543.206989][T15595] bond0 (unregistering): Released all slaves 22:19:57 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 544.796558][T18632] chnl_net:caif_netlink_parms(): no params data found [ 544.997312][T18632] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.004480][T18632] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.015980][T18632] bridge_slave_0: entered allmulticast mode [ 545.027267][T18632] bridge_slave_0: entered promiscuous mode [ 545.036548][T18632] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.043600][T18632] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.087906][T18632] bridge_slave_1: entered allmulticast mode [ 545.108388][T18632] bridge_slave_1: entered promiscuous mode [ 545.172476][T18632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 545.184074][T18632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 545.258254][T18632] team0: Port device team_slave_0 added [ 545.264902][T18632] team0: Port device team_slave_1 added [ 545.367671][T18632] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 545.374657][T18632] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 545.400594][T18632] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 545.545061][T18632] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 545.552048][T18632] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 545.578392][T18632] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 545.749468][T18632] hsr_slave_0: entered promiscuous mode [ 545.846152][T18632] hsr_slave_1: entered promiscuous mode [ 545.878299][T18632] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 545.936823][T18632] Cannot create hsr debugfs directory [ 546.535421][ T27] audit: type=1400 audit(1700777999.870:142): avc: denied { unlink } for pid=2761 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 547.257041][T18632] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 547.298706][T18632] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 547.318272][T18632] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 547.336433][T18632] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 547.409649][T18632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 547.428763][T18632] 8021q: adding VLAN 0 to HW filter on device team0 [ 547.439654][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 547.446728][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 547.467457][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 547.474517][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 547.581869][T18632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 547.711909][T18632] veth0_vlan: entered promiscuous mode [ 547.731809][T18632] veth1_vlan: entered promiscuous mode [ 547.767057][T18632] veth0_macvtap: entered promiscuous mode [ 547.798246][T18632] veth1_macvtap: entered promiscuous mode [ 547.847753][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.858365][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.868223][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.878691][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.888557][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.899083][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.908896][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.919386][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 547.929281][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 547.939772][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.067324][T18632] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 548.094999][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 548.105463][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.115328][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 548.125964][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.135907][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 548.146334][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.156154][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 548.166666][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.176523][T18632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 548.186975][T18632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 548.202968][T18632] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 548.213849][T18632] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.222715][T18632] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.231456][T18632] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.240189][T18632] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 22:20:01 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:01 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:01 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:01 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:01 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d", 0x5d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:01 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r3, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:01 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:01 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859", 0x6f, 0xfffffffffffffffb) 22:20:01 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859", 0x6f, 0xfffffffffffffffb) 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a3004458", 0x38, 0xfffffffffffffffb) 22:20:02 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a3004458", 0x38, 0xfffffffffffffffb) 22:20:02 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:02 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7e") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:02 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) r2 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r2, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:02 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17", 0x5e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:02 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec", 0x1, 0xfffffffffffffffb) 22:20:03 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec", 0x1, 0xfffffffffffffffb) 22:20:03 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:03 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:03 executing program 1: add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900), 0x0, 0xfffffffffffffffb) 22:20:03 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:03 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:03 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:03 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:03 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7e") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:03 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) r1 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r1, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:04 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17", 0x5e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:04 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:04 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r1, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:04 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:04 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) 22:20:05 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7e") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:05 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) 22:20:05 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:05 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 552.339357][T18923] cgroup: fork rejected by pids controller in /syz0 22:20:05 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:05 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) 22:20:05 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r1, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:06 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17", 0x5e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:06 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) 22:20:06 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:06 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:06 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:06 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r1, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:06 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) 22:20:07 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:07 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) 22:20:07 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) 22:20:08 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:08 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r7 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) 22:20:08 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:08 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:08 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:08 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) getpgid(r5) 22:20:08 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:08 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:08 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:08 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:08 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, 0x0, &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:09 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) 22:20:10 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r4 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r4, 0xe, 0xffffffffffffffff, 0x0) 22:20:10 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:10 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7") fsmount(r2, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:10 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:10 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(0xffffffffffffffff, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:10 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:10 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:10 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:11 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:11 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:11 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:11 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:11 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:11 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:12 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:12 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:12 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(0xffffffffffffffff, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:12 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:12 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:12 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="e04a91e3684c7eb7ee") 22:20:12 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:13 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:13 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:14 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(0xffffffffffffffff, 0x1, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:14 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:16 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:16 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 22:20:16 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:16 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 575.206945][T18355] syz-executor.3 (18355) used greatest stack depth: 9704 bytes left [ 580.116169][ T47] ================================================================== [ 580.124254][ T47] BUG: KCSAN: data-race in fprop_new_period / fprop_reflect_period_percpu [ 580.132907][ T47] [ 580.135224][ T47] read-write to 0xffffffff86efbd60 of 4 bytes by interrupt on cpu 0: [ 580.143262][ T47] fprop_new_period+0xaa/0xe0 [ 580.147912][ T47] writeout_period+0x59/0xe0 [ 580.152483][ T47] call_timer_fn+0x37/0x2f0 [ 580.156965][ T47] __run_timers+0x46c/0x650 [ 580.161444][ T47] run_timer_softirq+0x31/0x40 [ 580.166193][ T47] __do_softirq+0xc4/0x279 [ 580.170603][ T47] irq_exit_rcu+0x3b/0x90 [ 580.174916][ T47] sysvec_apic_timer_interrupt+0x6d/0x80 [ 580.180533][ T47] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 580.186497][ T47] xas_find+0xb/0x3f0 [ 580.190476][ T47] find_get_entry+0x49/0x290 [ 580.195046][ T47] filemap_get_folios_tag+0x136/0x210 [ 580.200405][ T47] filemap_get_folios+0x32/0x40 [ 580.205245][ T47] ext4_do_writepages+0x1027/0x2100 [ 580.210425][ T47] ext4_writepages+0x15e/0x2e0 [ 580.215167][ T47] do_writepages+0x1c2/0x340 [ 580.219736][ T47] filemap_fdatawrite_wbc+0xdb/0xf0 [ 580.224920][ T47] filemap_flush+0x95/0xc0 [ 580.229313][ T47] ext4_alloc_da_blocks+0x50/0x130 [ 580.234403][ T47] ext4_release_file+0x5f/0x1c0 [ 580.239231][ T47] __fput+0x299/0x630 [ 580.243202][ T47] ____fput+0x15/0x20 [ 580.247170][ T47] task_work_run+0x135/0x1a0 [ 580.251790][ T47] do_exit+0x604/0x16d0 [ 580.255940][ T47] do_group_exit+0x101/0x150 [ 580.260511][ T47] get_signal+0xf4e/0x10a0 [ 580.264908][ T47] arch_do_signal_or_restart+0x95/0x4b0 [ 580.270428][ T47] exit_to_user_mode_loop+0x6f/0xe0 [ 580.275600][ T47] exit_to_user_mode_prepare+0x6c/0xb0 [ 580.281135][ T47] irqentry_exit_to_user_mode+0x9/0x20 [ 580.286578][ T47] irqentry_exit+0x12/0x40 [ 580.290977][ T47] asm_exc_page_fault+0x26/0x30 [ 580.295805][ T47] [ 580.298108][ T47] read to 0xffffffff86efbd60 of 4 bytes by task 47 on cpu 1: [ 580.305456][ T47] fprop_reflect_period_percpu+0x22/0x1a0 [ 580.311151][ T47] __fprop_add_percpu_max+0x58/0x180 [ 580.316413][ T47] __wb_writeout_add+0x7e/0x1d0 [ 580.321246][ T47] __folio_end_writeback+0x21b/0x4a0 [ 580.326523][ T47] folio_end_writeback+0x74/0x1f0 [ 580.331529][ T47] ext4_finish_bio+0x45c/0x8c0 [ 580.336268][ T47] ext4_release_io_end+0x8c/0x1e0 [ 580.341268][ T47] ext4_end_io_rsv_work+0x2d3/0x360 [ 580.346440][ T47] process_scheduled_works+0x5b8/0xa30 [ 580.351872][ T47] worker_thread+0x525/0x730 [ 580.356437][ T47] kthread+0x1d7/0x210 [ 580.360483][ T47] ret_from_fork+0x48/0x60 [ 580.364897][ T47] ret_from_fork_asm+0x11/0x20 [ 580.369640][ T47] [ 580.371941][ T47] value changed: 0x000000bd -> 0x000000be [ 580.377629][ T47] [ 580.379925][ T47] Reported by Kernel Concurrency Sanitizer on: [ 580.386045][ T47] CPU: 1 PID: 47 Comm: kworker/u4:3 Not tainted 6.7.0-rc2-syzkaller-00095-gd3fa86b1a7b4 #0 [ 580.395998][ T47] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 580.406027][ T47] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work [ 580.412778][ T47] ================================================================== [ 582.392766][T17283] syz-executor.0 (17283) used greatest stack depth: 9664 bytes left [ 583.462151][ T26] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.512290][ T26] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.616064][ T26] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.706597][ T26] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.298521][ T26] hsr_slave_0: left promiscuous mode [ 584.304167][ T26] hsr_slave_1: left promiscuous mode [ 584.309893][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 584.317307][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 584.324842][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 584.332337][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 584.339855][ T26] bridge_slave_1: left allmulticast mode [ 584.345474][ T26] bridge_slave_1: left promiscuous mode [ 584.351173][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.359086][ T26] bridge_slave_0: left allmulticast mode [ 584.364797][ T26] bridge_slave_0: left promiscuous mode [ 584.370502][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.380001][ T26] veth1_macvtap: left promiscuous mode [ 584.385493][ T26] veth0_macvtap: left promiscuous mode [ 584.391073][ T26] veth1_vlan: left promiscuous mode [ 584.396325][ T26] veth0_vlan: left promiscuous mode [ 584.474054][ T26] team0 (unregistering): Port device team_slave_1 removed [ 584.484976][ T26] team0 (unregistering): Port device team_slave_0 removed [ 584.494969][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 584.507151][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 584.541910][ T26] bond0 (unregistering): Released all slaves [ 584.740918][T19361] chnl_net:caif_netlink_parms(): no params data found [ 584.776700][T19361] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.783840][T19361] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.791197][T19361] bridge_slave_0: entered allmulticast mode [ 584.798731][T19361] bridge_slave_0: entered promiscuous mode [ 584.805442][T19361] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.812623][T19361] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.820191][T19361] bridge_slave_1: entered allmulticast mode [ 584.826680][T19361] bridge_slave_1: entered promiscuous mode [ 584.844889][T19361] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 584.855572][T19361] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 584.881566][T19361] team0: Port device team_slave_0 added [ 584.888771][T19361] team0: Port device team_slave_1 added [ 584.905551][T19361] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 584.912544][T19361] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 584.938491][T19361] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 584.951043][T19361] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 584.958158][T19361] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 584.984108][T19361] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 585.011194][T19361] hsr_slave_0: entered promiscuous mode [ 585.017236][T19361] hsr_slave_1: entered promiscuous mode [ 585.315381][T19361] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 585.329337][T19361] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 585.338362][T19361] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 585.348150][T19361] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 585.389055][T19361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.403017][T19361] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.414287][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.421375][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.443124][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.450203][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.510323][T19361] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 585.623532][T19361] veth0_vlan: entered promiscuous mode [ 585.635017][T19361] veth1_vlan: entered promiscuous mode [ 585.653400][T19361] veth0_macvtap: entered promiscuous mode [ 585.661166][T19361] veth1_macvtap: entered promiscuous mode [ 585.672232][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 585.682748][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.692573][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 585.703025][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.712868][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 585.723316][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.733178][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 585.743614][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.753472][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 585.764016][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.774746][T19361] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 585.783408][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 585.793911][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.803798][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 585.814254][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.824053][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 585.834546][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.844348][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 585.854775][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.864626][T19361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 585.875064][T19361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 585.888630][T19361] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 585.900859][T19361] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 585.909643][T19361] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x0, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 22:20:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) [ 585.918408][T19361] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 585.927198][T19361] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 22:20:39 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:39 executing program 1: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x0, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:39 executing program 1: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 1: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 22:20:39 executing program 5: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 5: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x0, 0x1) keyctl$link(0x8, 0x0, 0x0) 22:20:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 5: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 22:20:39 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:39 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 22:20:40 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") 22:20:40 executing program 4: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49b", 0x62, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") fsmount(r2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:40 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") 22:20:40 executing program 4: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:40 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x0, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e368") 22:20:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:40 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x0, 0x2}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x0, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:41 executing program 4: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7e") 22:20:41 executing program 3: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5}, 0x400, 0x9, 0xc0, 0x3, 0x3ec, 0x40, 0x1f, 0x0, 0x400}, r5, 0xffffffffffffffff, r7, 0x1) r9 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r9, 0x6, r10) add_key$fscrypt_v1(&(0x7f0000000a80), &(0x7f0000000ac0)={'fscrypt:', @desc3}, &(0x7f0000000b00)={0x0, "72e45202ea52ed46f5f05dd5e8189720ee864958a3e2478b7f3c82d13c459912d1dce66987909819588723b88ecb21cd108d283a6e0465a939a4a2c046a2a565", 0x21}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 5: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x1000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r0, 0xe, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="ec1e4340b239daff76ba698961c4767076c4aa268f35e019807abb39e47e30a10e707bf9af9a1210d6479dde72abb8ca452226a6a30044583cfa470ab9a4dcbd69d80d1ce7f5182c69584b1797de4a7211116d8d5dc5c0cbd0f8ec920cad8342edd3d183eb2faf159a7d845fc04859f85da10a40b2dd6afe76e43b9153e5b8bb4d205a8c7ad4a7d16ef2aa68d821b29ddb409d8acb027dfc8018e5bfb9176aa567f6a686cd032c4346adc1d83b225de9ca5ab964c41e86cc3d46aa9533c41e40e4f673d9c611e8d999301faa7186430e5ca32fa2a3e5922715384a33be1a", 0xde, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 22:20:41 executing program 0: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf", 0x5f, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7e") 22:20:41 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x80000001, 0x2}) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x2) r1 = fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ip6tnl0\x00'}}, 0x1e) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x200, 0x40200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000180)={0x200, 0x3, 0x4d, 0xee1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000240)) r5 = syz_clone(0x1000, &(0x7f0000000340)="a790bca3a40195d0b94c1a30ffe3f36be4963c185e088d8233f92af550c158a4f28eaef9edb3907ce42fce0602e572663db7724c652854c98428bb6b13ebd6b9f62c01580e371e6ff25fa0c089fcde54ee50b0c99ba8a49bb771a63c0d17bf7ad49bd434c7", 0x65, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="e04a91e3684c7eb7ee") r6 = fsmount(r4, 0x1, 0x1) r7 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0xef, 0x5, 0x4, 0x0, 0x7ff, 0x80388, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x0, 0x3, 0x5, 0xef3, 0x5, 0x7, 0x0, 0xffffffff, 0x0, 0xb3cf}, r5, 0xe, r6, 0x0) r8 = getpgid(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r0, 0x0, 0x1, &(0x7f0000000480)='\x00'}, 0x30) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x84058}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x80000000}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x7f}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x34}}, 0x4) sendmsg$key(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x12, 0x2, 0x2, 0x10, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bbf, 0xc6, {0x6, 0x33, 0x3f, 0x80, 0x0, 0x0, 0x0, @in=@empty, @in6=@local}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_lifetime={0x4, 0x3, 0x9, 0x10001, 0x7e9, 0xdca}]}, 0x80}}, 0xc005) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x1, 0x20, 0xb3, 0x3, 0x0, 0x8000000000000001, 0xa0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x5},