ET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:41 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:41 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6185310002a700000100000000000000000000e4dbb77487e901175ecc2a137fd216e3880400ffffff7f00000000000000011bfb00000000000000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010044e844c53bb418ec0cb6601b2022eec467beaa47afad9812f3761b5e9897ef0dc9160ae6824c853fc8eb1641811b87a1448fe36784ad33a15a393d3e3b15df5690790568c214986f2f926ef210c9f2430e9"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:41 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:41 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:43 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r2, 0x4000000000000010, 0x9, 0x7fff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x3c39b2a02259b330}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="2800ff06", @ANYRES16=r3, @ANYBLOB="000428bd7000fd08000000000000140006000800010001048e80080001002f0000000cefcd41c9ebd95825a8e7010058853969c1608a00"/65], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4a480000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x2f8, r3, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9df}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5edd4692}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8e, @loopback, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @mcast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x660d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb9b6}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x24083910}, 0x10) r4 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = dup(0xffffffffffffffff) write$uinput_user_dev(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000240)) 07:13:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:43 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00=\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cef5597786ad6124cd342703da850dc4f2eace3b61839356e85e695fc295164833da1892f8a067d619b7ce4dac297af7cd54ffe50315e64381ac3c530bae1ee549a1641b9f3d6bbe5839aef2856e5e9926234"]) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00'}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:44 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0xfffd, 0x9, 0x1, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000180)='./file0/file0\x00', 0x9, 0xa, &(0x7f0000000980)=[{&(0x7f0000000440)="f2d6bae07e05347cf1b5a7bfd87592eebedc23c16a40005e0c83bb69c99a37684ef4f52da219e72f7aa4723191dec060ba2444e7db9eaa5b05ec934b512ed2c98586c61171cdff20375cd4edb44b841cc90727e92e39e96c07e21978104f471d6a18afc9639ea6d34eb24a5539417a87f1a7017bb590fb81a5ca7e5212c487a36c090471113d679452d785f66beeed918d65823cfa8b6982f90473d2c60411dcf9b66ed76613284d6fa7db6be7f9e19d7f9d6602db50aece6068e76759e1c6c9052713c1262241eac3608cfebbf350ef7a73bcaf24b6fc630a2e98472847fc23c3ea4cacbd3664facd80b7c8f6", 0xed, 0x7fffffff}, {&(0x7f0000000540)="bb8364f2ff41cc5fa6f31c9d796f503301e8b7fb0781e98e34fa8bbd6254154fb5f5c7d3d8bbad75e739777e57c6cc73a4af58780d4c2f12b12ae18d0e2d3f5fb30cd8430b4bd0da3b4ccf3ae698ad177c2228d0e5fbd9a283b5347a5ee52bade84b4b7d4b28f1252924354d871d7e9273b8", 0x72, 0x46}, {&(0x7f00000005c0)="c8a0088d2d79da337c4156135c1e231c46abc65dd161ef17dce9d1100f1d1d13cf7010925f2ecdda963ca72e02f9eb3fb4de88d77e570bbae171d6c71f955a862eee78400556579c9e77eb22a0f05f1d4821a8456f749c6d3d", 0x59, 0x6}, {&(0x7f0000000640)="1604be88bd152093fc8d01db7a51f34512eb26863603cfa67b6b419804962ad0a7a164e6f3a5eae1627de01a5ba90f0bb4d3d490a3d357ff49ccc1d97bdc7c421aeeabcdb56c1cab7d2cc163d8e2ce10cc76562ad034398fb6fb2fa19708496d7984a2f3d09a3a1c6c75c9202b7d86302ce6ffe18aefc52adceed2e159f6ea26fdccfcbdaf97ad28980dcd8f3a90758cee5adcea602ada00f33c249e8413e700580ff25d7ff17f3c91efb3f21b8b2a7a4ff64321745df37ea6add334d4bcd947612d8665072d67dbab273a00e3d9a3a4d9e1e2dd927f652aaf83f1f2b31fc3f3669e0dc2c0ea5eeed35982260f", 0xed, 0x2621}, {&(0x7f0000000200)="e6f3b12d9d28e1061fc4", 0xa, 0x400}, {&(0x7f0000000740)="3b94340de9f18816fbf05267f719f2f9f0c80cdf59c84fe6b2efb8fcd3194d3245aae18fe13e7e08780e411491bccd64d9fbf828ad72b7ae243e7133bfe6b026a3a045e1a356dc14cd0f9f2f7c387be8b5b3c85d41", 0x55, 0x3}, {&(0x7f00000002c0)="6728fe23769dbacc34b92541d958ca67bad3356beef195a82a7ab50b719d0d53b7291dba31874d1287a06d1d30be984ea92f19f75cc3351b33ee42702ba056", 0x3f, 0x5}, {&(0x7f00000007c0)="bd8a66581fdb66022f4af84ade1fc5a3456cb7887c35a3d48135378af27dad70208c132dfadb9de12a5538c1a601dd83980d1d02be0d8fc6ddcbe376d875161cd754107b831d9f3579c1e4d82b3ea4029496c7133e857f90c00c214c3c070e4bc14528b1e622a79b2f09f64fbda06459b147dc59011a7529bd2cfd34c021fbe9b44b943750", 0x85, 0x1000}, {&(0x7f00000003c0)="52da0467bdcfb6bf0dcf66ddb309a8f005ca5a1671", 0x15, 0x8}, {&(0x7f0000000880)="70025dbdb7448032f8a81465d2e22f322b0a3a566207a70e702df403d210f6dabbd26997280cc88b73d51e0b357e42acc937b44fc69801a15dfe4e46af44f40c9c84ebf7360d03902d764b3bd29cdb43cbd6f17dcf3f9246e8a9456d4060dae6a8aa085081a2cf2b03eafb13ab003c4bb66d13fe4a422a76989e885dbf929aac11255cd3d7a45a468ae02ab78b348f52ee458e363c6df925fc78dfa96dbaa1ddbe1f9b77fa2a04d8ac1f6de19d91b5b552d48b1e592f2c0fe5be565ffadc833fb2ce1f71dbcb2408a655384b2ad4030bb41e8abd833dfc5621be3cdfacf58e", 0xdf, 0x100}], 0x2000000, &(0x7f0000000a80)={[{@discard='discard'}, {@dioread_nolock='dioread_nolock'}, {@lazytime='lazytime'}, {@data_journal='data=journal'}], [{@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0xbd}}, {@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '(nodeveth1]'}}]}) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000b40)=0xfffffffffffffff8) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:44 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_access\x00') socket$inet6(0xa, 0x4, 0x94) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000240)={{0x2, 0xffff, 0x40, 0x20}, 'syz1\x00', 0x29}) 07:13:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000000)) 07:13:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00'}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:44 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffffffffffff40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:45 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b23000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000873e0000000000b646912367ef15caa0374684b200080000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x23, &(0x7f0000000180)=""/35, 0x41100, 0x4, [], r3, 0x10, r6, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xf, 0x7fff, 0x3}, 0x10}, 0x70) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r8 = socket(0x3, 0x800, 0x81) getsockopt$inet_mreq(r8, 0x0, 0x24, &(0x7f0000000000)={@dev, @loopback}, &(0x7f0000000440)=0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00'}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:13:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:45 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000440)={0xe, 0x8, 0x46, 0x8, 0x9c, "6031f047f0d56f45f7c00262cd2c046f447b391ef6e0a609ef9ad760fdb2b60b1beca2690014a620709a58a57215dca13b98eed89edd006f3a66c266f3297be7ccd821c4bb3db37205ced3653bc862c1c0609e2c3bd5f9a4294d828207a04c80bee2c3e71f918ebd3d84e852eb5761c88dfe23017783508f4676c6de250d9dfb79fef4a56b96d5e880fb4c430a4cdbf09e59fae70b2054bdabc376c8"}, 0xa8) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 07:13:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:45 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r5, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0xa}, @multicast1, 0x1, 0x3, [@empty, @broadcast, @empty]}, 0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 07:13:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:46 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x1}) dup2(r5, r6) r7 = openat$cgroup_ro(r5, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') r9 = socket$unix(0x1, 0x5, 0x0) bind$unix(r9, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r9, 0x0) r10 = socket$unix(0x1, 0x5, 0x0) connect(r10, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r11 = gettid() r12 = gettid() sendmmsg$unix(r10, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x3}, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r9, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r12, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f8a50000"], 0x70}], 0x437, 0x2000040) sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r8, 0x10, 0x70bd28, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r12}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004020) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20030010}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x60, r8, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x9}, 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r13 = dup(0xffffffffffffffff) write$uinput_user_dev(r13, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r14, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r14, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r14, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r14, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$UI_BEGIN_FF_UPLOAD(r14, 0xc06855c8, &(0x7f0000000240)={0x8, 0x8, {0x51, 0x0, 0x81, {0x1, 0x1}, {0x2, 0xdf}, @const={0x2, {0x80, 0x8, 0x9, 0x7}}}, {0x55, 0x1f, 0x6, {0xfffe, 0x9}, {0x1ff, 0xffff}, @period={0x5d, 0x1ff, 0x3, 0x5, 0x8, {0x3, 0x1ff, 0x0, 0x800}, 0x1, &(0x7f0000000000)=[0x6]}}}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 07:13:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e24, @rand_addr=0xeb06}}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030b0303030303030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:46 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$int_out(r1, 0x5461, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c3c13e766518004c8bddaa6e41ced90dfeb4bf2002fdd8b375b248adad14b61e697199fe0ba6dd38ceeb7509c27cc1475e15e54f8964b4e2844fa3946626384fad9fd8f26ab80e1da6e2"]) fadvise64(r3, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x200000000, 0xfffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000440)=ANY=[@ANYBLOB="000000000000000010b7705f0000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f33800000000000000000000000000000000000000000000000000000000000000fc93772c6ed0d07dd18e095de0402a827a31bf6fce648991da4c02a47722f69735378a3b6982524e2f3138849b55378468e292e100000000"]) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000180)={@local, @loopback}, 0xfffffffffffffdd0) r4 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000011c0)}}], 0x1, 0x24065) getsockopt$inet6_int(r4, 0x29, 0x44, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r5 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000400)={0x7, 0xffff, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x0, 0x2, 0x8}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r7, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r7, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r8, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r8, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r9, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r9, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) mount$fuse(0x0, 0x0, &(0x7f0000000640)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="ce0000d7f454", @ANYRESOCT=r9, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[]], @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r6, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0xffffffffffffffba, &(0x7f0000000340)}, 0x10) r10 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r10, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 07:13:47 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x0, 0x0}, 0xffffffe1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='/\'procppp1\x00', r1}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:48 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0xf, &(0x7f0000000000)) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:48 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) pwrite64(r1, &(0x7f0000000440)="33ef1b38ac86b4c56dfb6727686440ad93e08c6cb73da390552e58602eef390f251bb8de2b51b31c57d087f0856aae3e9d4bb08ea5e53eb8c137c1b452f68c78b2a275875a922aa0c7524675c8a0b268779ce04b5f7698a83ad9d33889006563804983b1355e3a408eef635e7047524d4b1bee86204ae32fc50241641f7eb32458dff534058ec9cbfac432a52831c813", 0x90, 0x7) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:13:48 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_pwait(r4, &(0x7f0000000000)=[{}], 0x1, 0x2, &(0x7f0000000080)={0x4}, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$security_evm(r5, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "5c9dd1d85b64a827ff15be09312b3305"}, 0x11, 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r6, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0xfffffd2c, 0x10}, 0xc) 07:13:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0xfffffd2c, 0x10}, 0xc) 07:13:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:13:49 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RWALK(r3, &(0x7f0000000000)={0x23, 0x6f, 0x1, {0x2, [{0xa5, 0x0, 0x4}, {0x0, 0x3, 0x1}]}}, 0x23) fadvise64(r4, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r6 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r5, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004d71c305965facce56391b8b0953834def918bca83d6c73e19db4bad2c1bbd656046c6745dd9b8caa1cecdb7df7aa52a5bf1ef5ac6bce07d008b034736560afd2b8e3128184aa187e8534840b3c6057ed0fefd186b3de520b031c90f3fc9498ce0a1f89ad07796322494283437f4da41ace1a2846c3e0e8dceb3984ccfbbb6fd88ec10141"], 0x1) socket$inet(0x2, 0x80000, 0x7) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000100)={0x16, 0xb3, &(0x7f0000000240)="d71a71f07905858ae0eb55ff0adf23fdb135cc341f29579d83870d63ab0b41ebdb3c4d10445698046fd0bf53c18ede1c48acc2194d71c69ebf6907974c537ebeb5964b5ec6528349f5148cb9c405785d8bddd1e95f73f1256e71b69c51b0ba30ca68449640f2e745496be5f9df2e85c3fa58e058efc5cb0aab0e93a2ee301dfd4531d0b78c5819281d5ce0d35b9020d90f2b00bb53370a0a9d924489986628de5c361cbdc308d5b055d95be6cd20ff3834c4a0"}) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) pwrite64(r3, &(0x7f0000000080)="f01a061569da70952f85c7438bb9a0685d01e6b0fb4d410db55dff5f60608b8020d0e51a52ecb08faff4df816f6abf8e82d22931422bfb196482", 0x3a, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r4 = dup(0xffffffffffffffff) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="44dd17d4ef5150cb0944c44213a3b4f2a6d1fdb54224d097b71f08d034077b4ddf8446b6decfa013913064d5eaa8ad42db5e0f80f6a249110fed5062a4f00994da6fffc5e8140f7eb7f512ff4a8d703634f4599232fdd0fa614f7ab614a540f096bf1ba1d014bbad7b791d5484c6e3e262441b1d763418a9023eb795545bc1e0bbaf25453ac522392d1df8c4c6da5f37bfc3046c1fdfa7de23285bdf071a82a6477dcab2d6277591406b4c", 0xab) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:13:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:49 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r3, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000000)=""/41, &(0x7f0000000100)=0x29) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[], 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="83643d", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6d378cfcb6779eea35b5a3cfb4000000000000"]) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) openat$cgroup_ro(r4, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r8, 0x4000000000000010, 0x9, 0x7fff) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r8, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x3c39b2a02259b330}, 0xc, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB="96b889c2ae73257cbbcc60cd37d9692d0eda3bce71bc2c73ed949dd6a480197e7546c888a29486e6b23eb4368ed13da092f5befd62c7006815fb97e56b0cdd1fbee10622faa416f03130f943db1b184a3a5b4830ba9fad8e48298cdfccc7dc4e8d5b431f92005fa0deb8d45c14f8f41a026b5f9a92a78951700dbbdf3b24f4e54533b282c6db05d54f439d748728476fe3f2582e62687a534279ae8c8b0c73cc6adc1a1f0a38a0601c7eb2242ad1680ee11df7bf07e9640168be7172082225c496ca7aba9da1047a59cb1bafa96fd6cecbbc14c43e684be03139fe14ee8efc96313c0b645421d5480538492c1f49ce1c37e1ff1d93a2f15bc5085d172b004fe765497bc44d983003b1aef1f9ec4a90f92c5d2cd079af0fda6919c2c79e66d83089ca72943c99629b76cc7a9e325f63366b6f13188b0000", @ANYRES16=r9, @ANYBLOB="000428bd7000fd08000000000000140006000800010001048e80080001002f0000000cefcd41c9ebd95825a8e7010058853969c1608a00"/65], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) sendmsg$TIPC_NL_NET_SET(r7, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2a846004}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x16c, r9, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6260}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xfc, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8cd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x70f1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61a000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[], 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[], 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:49 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000580)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, 0x0}, 0x800}], 0x1, 0x0, 0x0) r4 = socket(0xa, 0x80001, 0x37) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x260000, 0x0) dup2(r5, r5) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup2(r5, r7) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8, 0x1, r8}}}}]}, 0x38}}, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000480)={0x0, 0x1, 0x0, r9}) r10 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r9, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r10, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40041}, 0x2000c00a) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r10, 0x300, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x804) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r10, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x30, r10, 0x904, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x514, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x44085) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r10, 0x4, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x40) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r11 = dup(0xffffffffffffffff) write$uinput_user_dev(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:52 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYRES16=r3], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r6, 0x0, 0x0, 0x0) getrlimit(0x8, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r8 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r7, 0xfffffd2c, 0x10}, 0xc) r9 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r9, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_int(r9, 0x29, 0x26f0f14f327dc51e, &(0x7f0000000180), &(0x7f0000000200)=0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:52 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/sockstat6\x00') write$selinux_user(r3, &(0x7f0000000240)={'system_u:object_r:udev_exec_t:s0', 0x20, 'staff_u\x00'}, 0x29) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r4 = dup(0xffffffffffffffff) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80400) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000100)) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[], 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:52 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000500)={0x1, 0x1, 0x1000, 0x8, &(0x7f0000000000)="2498abead4acbbd5", 0x83, 0x0, &(0x7f0000000440)="f094f4fde96523f52b1d0f590df1afccf4e03f7f8ce7defe77aff503c8d6b07e71c4af23bd421ddefdc2f71773248903262bd2ce925028a6ea12498e6501a48edcf8c91563a0fe9242361e92cf22a747062bbbd44e8e7f5e91df3ccbc1145ca2fe9b0bc61f203505cd82bdce65b7df63f5fae21a2e4ef3727c0cae3ae3e8246b1b76a7"}) 07:13:52 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x1, 0x0, 0x4, 0x0, 0x7f, 0x8484, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x82) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = dup2(r1, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f1000000000000080000f30200000000000000f8000ae7b8bbb76cab10040000100400"/101], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:53 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYRES16=r3], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r6, 0x0, 0x0, 0x0) getrlimit(0x8, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r8 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r7, 0xfffffd2c, 0x10}, 0xc) r9 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r9, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_int(r9, 0x29, 0x26f0f14f327dc51e, &(0x7f0000000180), &(0x7f0000000200)=0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:53 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9353dce5fbdd6864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x2400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x2, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = creat(&(0x7f0000000680)='./file0\x00', 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r9, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r9, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) pipe2(&(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r11, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r11, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r12 = dup(r11) r13 = eventfd(0x903f) io_submit(r2, 0x7, &(0x7f00000019c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0xc6, r1, &(0x7f0000000180)="69f4", 0x2, 0x3, 0x0, 0x0, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xf10c721dd2603451, 0x84d, r0, &(0x7f0000000440)="035f0186483d1fac15261471a7f4b7be1b3dd3600cf7cc7d5649cd28134c1c377e46d5dc55b3860a6af31d497d7578f2bf3ad2b695f504e905427960cffc6b96", 0x40, 0x8001, 0x0, 0x1, r6}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x7, r7, &(0x7f0000000580)="41fa0fde837102f53ec11d2b3e8233ec0c6cf7849c3a7ab7b84ca7f6177249daff987bdd2744446207392af6d94acc0db698b963fa2feffff8848a5edf00d75e12ac77221c6e6d88edbd3311b171ca2a5cf1a41ad85ae016b12a4fc1f10a1091ae5ec4bac6d732a2e664b8c0acb4344ff153c996ceb97779c2b95bf9a32a8b02be27da190de96919257289623bc78cad42ab8e42004900ce17ce5a5e9f9f14753f13e9f33e6d11deddc1eb7ad52ece1476d6df476db29b6c02acec1a68862b9706a1438c370cbddf33d59d45bd94b2e5fd63b353ccb88041203ade9d8dbc1baf5de994e21cb04f6df04169bc7125145ad5f8150210591d0a457ffda2ee0b43", 0xff, 0x6, 0x0, 0x3, r8}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0x9, 0xffffffffffffffff, &(0x7f0000000700)="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", 0x1000, 0x3}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x7, r9, &(0x7f0000001740)="c2c63c29b917b28fe9c204b70abc9283bcb7fb5d7fcf1d34ef7a5890f6d5e0d81f34d72a3c7a7a529ca376898bf369e19176a7e13825397890d4289ea7b887d6b888d63edd3a93b781474e821cd20b34976e2d57da3d49b0891f338cccceff2374734950682d4ae0b87143a184b4a35473f54140eb7490bd2b10098e803245e7d877de0481333568159d5a881e7a4e5d7dc143de163d0105e12b0071d64e2c37c2c02e0ca8a9ae0129f10a0f0dc713773c2dbdc46e321675aea1af3278506b2c4fff12320531ad9a30cd843ca38aa2a4db534d7fc37d238ea361c9eb784192470b42eaea5b9b675cf02f1b52a509e7c48b39547fb8c671", 0xf7, 0x5, 0x0, 0x1, r10}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x6, 0x8, r12, &(0x7f00000018c0)="0dab6a34b72d602e992cf072cae6e3a75e6dd6667948b339f6a77f35ba5831ac71bdd581c8715a22b0a2908bee88c7a57a64d3636417132f3956c3d0161f1f56afe0337c88ebf249858e88d71fbe425e3e2b3f6cb70cdb8e1ad47ae6e8ccce54bfa1696372318a4fe44a8c6bdbf7f1dd28da3567dc1d850f7d882c345b4a571deffd990489d0f8d34ce265aa266ac9cab74f418024b45885cb4dbecf942b484e7974ab139d504e346a055f7ecffb7ca468ac483cac72813f2f9de5", 0xbb, 0xfffffffffffffffb, 0x0, 0x2, r13}]) r14 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r14, 0x0, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8042fb59c988569cb10ccacdcc7be645b9c62812209652b5d20b8659ee9a55a85e16e0026ecb21e6b5e2c1da757aa9fc8d6c49f98af01a2fc65416930b9509766085757369c150267ce40f80a872ee368c2921157e4f82d658c2a2be75ccf63ab4315e7d5aa34d17a495212be7a1243260bfa4a49ce103e8500c70df584d251103ebaec8a544811428fea915698d17b096a89463bc19d43"], 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0xd5, 0x3, 0x6f, 0x0, 0x5, 0x4000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x800, 0x551, 0x9, 0x8, 0x5, 0x4, 0x977}, r15, 0x6, 0xffffffffffffffff, 0x8) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r16 = dup(0xffffffffffffffff) write$uinput_user_dev(r16, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x18}, 0xf429) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:53 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$security_selinux(r3, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dhcpd_initrc_exec_t:s0\x00', 0x29, 0x2) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:53 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f653d30303030303030303030303030303030303032be900c142c757309000000643d00", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643db26482e7309897fbfec3a5232e83ece32b0a53cc8638af178ae1a6ab39e92f3ba34ae17b03c961ae1bcfa1271fba4a1176e2ff0a575b5200e6b5a5ddd72504eaed92c971300de918f0b850f3b104145796dd0b287dbeae9f939ad7a83b93d060a2fcbfeea27ca2dd5c9e5aadd798dcab96bd7c35d575b1734c10082ea0463d3a6c5e9fbc20e86309b3480bf1fb70f84f6a512ca7d26baf681ee5bc894cfb8b785404c7574050c43bf1e728f5419bd364adb5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:56 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r3, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="edff85621bd2b7b81e624b609fc1b5811b16cd5f669e719fc525fee51364b88b9a53030acba7361e8417ef8aa666fa4ec79015953dc702134f3a07d0d26a2a28", 0x40, 0x1}], 0x800, &(0x7f0000000400)={[{@utf8no='utf8=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@uni_xlate='uni_xlate=1'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@nonumtail='nnonumtail=1'}, {@utf8no='utf8=0'}, {@numtail='nonumtail=0'}, {@uni_xlate='uni_xlate=1'}], [{@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'nodev\xc0)^-.'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, 'lo,'}}, {@euid_gt={'euid>', r4}}]}) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb3"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:56 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0xb, 0x0, 0xfffd, 0x3, 0x26, 0x7f, 0x0, 0x2, 0x1, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rotmo000000000000000020000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0xc, 0x15, 0x15, 0x9, 0x1e8, 0x3, 0x113, 0xfffffffffffffffe}}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b8"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:56 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f5f70265f69643db05548a0801a2bca5a537aa5a59da515f946f84db3010be766b4f70fdefcc26711eb8de70f90c6bc17cc639c75d5b9b5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x2) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4002840}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0x68, r6, 0x200, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x9, @link='syz0\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0xb1) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:56 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb74787e9010400ffffff7f00000000000000011b23f3ff0403f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:13:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b8"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:56 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r7, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b8"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:13:57 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x9225d29faa19d73b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:13:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:13:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:13:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:15 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000180)=0x30) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x7f, 0x3, 0x4, 0x4}]}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000000)=0x6e, 0x80000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r4 = dup(0xffffffffffffffff) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0x7ff) write$binfmt_elf64(r5, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0xd, 0x81, 0x8c, 0x1, 0x0, 0x3, 0x3, 0x61, 0x251, 0x40, 0x34, 0x4c43a58, 0x8a, 0x38, 0x1, 0xfc0, 0xff, 0x80}, [{0x1, 0x4, 0x200, 0x2, 0x1f, 0x8001, 0x7ba0, 0x1}, {0x2, 0x7, 0x4, 0x2000000000000000, 0x100, 0x100000001, 0x81, 0x400}], "fae6e9e25a1eb25e27856e2b982224218746830048c2c5d17854191a0976a167a6fca79847a71cedb31ec07365aaf25c81b299549a38d1120432b752d3ec2b2f2fd1bc41d216307f9d1e2843ab50fe179a66707a5b38d47be471ea959e5b67dcb2b204a7b24db46aeca3858fd7e601ba77958d7d3c894883632c2701bbc40d8e86fbdbb5d780417a75fba230315c08412a5dbc4f7d18aae4412ff8691800d0439d92265555037b4979d4cfbd548af4346d9fe0f73a3e017d674ef54e2b7821afdd0978c137252dd7f531a9df62d66573fcb17b7ce17a5649a0e35f7c6c25efe9949cd6def9324c9eaa06e93853d84b95", [[], [], [], [], [], [], [], [], []]}, 0xaa0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b8"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:15 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) dup2(0xffffffffffffffff, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r4, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) sendmsg$nl_route(r4, 0x0, 0x20000000) getegid() request_key(0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB="64653d3030303030303030302881977a8c34007bf4de30303030303030303032303030000000000000a9143eb0029cfca288070400", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r7, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r9, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r8, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:15 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$security_ima(r2, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "0cb4205d"}, 0x5, 0x1) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:15 executing program 0: chdir(&(0x7f0000000000)='./file0\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x10200000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)) 07:14:15 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) 07:14:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:16 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000440)='./file1\x00') r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 07:14:16 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000user_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:16 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e823b745e022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac010000000000060000000100000000000800003f0000000000000000f8000ae7b8bbb76cab100400001004"], 0x1) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000240)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @local}, {0x2, 0x4e23, @multicast2}, 0x32, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x5, 0x21a, 0x6}) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) read$FUSE(r3, &(0x7f00000003c0), 0x1000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast1, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) 07:14:16 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67d56f75705f69643d2fafe6f7a77be2d2ebb639ed44dca82cb7e7b55d74f498b7f534ea80c63e6d3d0f41ebf332aee19990fb6b3df259300068391fdabf0032f9937a3e891ca914372ffa054252030abb01a34a4294b6ebc701aa2d0cb3ae3ee8fb2ec01b5e43daf3a373238543f755f8395f843f61dc8d2907855f76d3e8666955c3f9e28cd524c46728208e5c8e07ec5e1dcef2cb85a3704e752268e7c6b628f1a37381c8ca9f27570e87df88b0cda97c33059541e7bffcb1c551a860984098747c5ddb135fef1a00a1ec49b9fde17769e2a80c9d328ad45e1e450762a155e7dc3001343e98c66ceb7cc49ab47817368e8eeb8b125c28f3533f0fa17e24734a1eb24414dbfbe46a3d39bb4c74", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:16 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$P9_RSTATu(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="97"], 0x1) r4 = memfd_create(&(0x7f0000000240)='b\n\x00\x00\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x45011, r4, 0x0) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 07:14:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b6301000000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:18 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', r3}) r5 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61853100b083867846f22ef2207134cbaf022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d590f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r6, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r8 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r9, &(0x7f0000000540)="6a789aca022becdf9c700a3b3523937b221456657f782f7271cb4770d4a664c95d9541d549a2d3f58f6700eed60f6aa2039478b69dba4d92d398e4b4da80e98b72f0fee3bdc14dc856cfb7", &(0x7f0000000600)="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"}, 0x397) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r9, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) dup(r9) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r7, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x10}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:14:18 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)=0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 1246.232898] input: syz1 as /devices/virtual/input/input589 07:14:18 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x9) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 1246.350552] input: syz1 as /devices/virtual/input/input590 07:14:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:19 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) r2 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0xa, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x10000, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000e9fffffff334e1879047c8e1b57291741a9b72fb5885f020421da1971a109a0fbb0efcb7cec9894c0d4c940292a4e1f1f739b5cc99b4bc03b7063b1526d009c341fdc9a0352db3d34c38ccfe138aac6625850b2cd5f3e4fccc1bf2d8114bcc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r3, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x2f) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r6, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$KDGETKEYCODE(r6, 0x4b4c, &(0x7f0000000200)={0x31}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b06000000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:19 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r6, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) getsockname$unix(r6, &(0x7f0000000240), &(0x7f0000000000)=0x6e) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b06000000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:19 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:19 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb74787e9010400ffffff7f00000000000000011b23f3ff0403f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:19 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:20 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b06000000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:20 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:20 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f3020000000300000000000000b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b6301"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:20 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5da39d00519cd81260323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r3, 0x8}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r4, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r6 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r7, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r7, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r7, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) write$uinput_user_dev(r7, 0x0, 0xffffffffffffffad) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r5, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:39 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000000)) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000240)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x9, 0x1402100, 0x7ff, 0x8, 0x2, 0x3}}, 0x50) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x80082102, &(0x7f00000000c0)=r10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b6301"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:39 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) r5 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:40 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000001340)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x94000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x1, 0x0, [0x0]}) r3 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200050000000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76c7f100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000000)={0x20, 0x0, 0x3, {0x0, 0xa}}, 0x20) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r5) getgroups(0x1, &(0x7f0000000100)=[r5]) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b6301"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:40 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e618531003d4c00000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000510f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x330021}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)={0x118, 0x42, 0x0, 0x70bd2d, 0x25dfdbff, {0x1d}, [@generic="c0ccf0b84362e97d6679e34ec342f460149ad34fac5bcdec664beada21bd32101eb4f9d56f13da8e81c0513e89594e9af102f10bb7105071551b1a379cf17dd0b89f9dbf5eab2853c7f2b3327494d3b3e6c4fbe91ebc5728181e6d042f229eb41bc2c197392707b36cedb16f0050b5d723f38a645c2918a2e3ec172ab4a462bae23300252aeb6b7b8ac0138872438a503ceea4fbcf7a0c5cd553640e48f5133201ba07b24269e4e16a9edb7244934ad490d08a5698140aa0c2814a608fc812", @generic="acfea82604747be27da6f4c070bff7a5d1545c4b030b5ec0eba49604", @generic="efbb45bde8065008163d66b6abb917cea94e3a2ac613b9f456e15f8562f0adad77a5551116b24584"]}, 0x118}, 0x1, 0x0, 0x0, 0x1}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) sysinfo(&(0x7f0000000440)=""/139) dup(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:40 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r2 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff0500000000000000011b23000005000000000006000000010400000000080000f30200000000000000f8000ae7b89bb76cab10040000100400208c3fa0aa6d774ffdc2aeed1879195fa7bbb037812e7683"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:40 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f8521e2e4d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d2c3fddc99aee4765709cf3d6d336db61960203a868f03f5eb9ddf0f40925c4d63a7e"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c04"]) fadvise64(r0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0xfffffd2c, 0x10}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) gettid() write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a10, 0x1700) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:14:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x0, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:41 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) close(r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x0, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:41 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000240)="38d25142172f37bd3a256117d7c7f912e5fd0aaa49a43699f3f3da5fbdfa5c366ab0b33248719164596ab22ba6593846b49d81e7a7e96ed38080338931492966deaa1713d30cfd52f583aaa502fe3afcbac12b72e1f621037853538a6c1ac4638b4b83e925c14825736f0361317945e4ad2717465746a3d09fa059869ac5ba3c1f88b0ddd8b99ec0691457e7f6c1ca4e76202fda4d6a77d09b0d693ecc32e7106b74c67e83c3490e91976b98a63716cfb0f0bf40885f43ef9326c0bc387e766fc86e4321ff12f6a2f4d27bf210826c38f678ee08d8fe7ad7a35f5c321881b87b2bebb2", &(0x7f00000003c0)=""/139, 0x4}, 0x20) r2 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) r4 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r4, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000480)=r5) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r3, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000180), 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:41 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x10) r0 = getegid() request_key(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='$', &(0x7f00000001c0)=""/101}, 0x11) r3 = dup2(r1, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060020006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f543774303030303030303030303032303030302c757365f25f69643d0000000834767e7a405ac947716a829a32a0d5000000000000aa", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) fadvise64(r4, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r6 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r5, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x0, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:41 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r3, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000000000), &(0x7f0000000100)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:42 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000180)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) listxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000440)=""/70, 0x46) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, 0x0, 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:42 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETA(r7, 0x5406, &(0x7f0000000180)={0x0, 0xfffd, 0x1000, 0xffff, 0x2, 0xd0, 0x1, 0x1, 0xffff, 0x2}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, 0x0, 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x0, 0x1}, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:43 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022215000100000000000000000000e4dbb77487e9010400ffffff7f0000a4dc840810f0eb22170000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22d"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000180)={0x4, 0x0, 0x1ff, 0x7}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) getgid() pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:14:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, 0x0, 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:43 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:44 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000100)={0x5, &(0x7f0000000000)=[{0x3}, {0xf1, 0x6}, {0x1ff, 0x20}, {0x4fdb, 0x2}, {0x101, 0x3ff}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:44 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000080)={0x0, 0x7fffffff}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @multicast2}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x9, &(0x7f0000006d00)={@local, 0x0}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000007480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000007440)={&(0x7f0000006d80)={0x1c8, r3, 0xb16, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8}, {0x128, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff8000}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x600}}}]}}, {{0x8, 0x1, r6}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}]}, 0x1c8}}, 0x2009c014) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r10, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r12}]]}}}]}, 0x38}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r14, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r16}]]}}}]}, 0x38}}, 0x0) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r17, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r17, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r17, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r17, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) getsockname$packet(r17, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14) r19 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r19, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r19, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r19, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r21, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r22}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r23}]]}}}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r19, 0x8933, &(0x7f00000005c0)={'rose0\x00', r22}) r25 = socket$nl_route(0x10, 0x3, 0x0) r26 = socket$netlink(0x10, 0x3, 0x0) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r27, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r26, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r28}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r29}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r25, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x38}}, 0x0) r30 = socket$nl_route(0x10, 0x3, 0x0) r31 = socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r32, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r31, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r33}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r34}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r34}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x38}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r37 = dup2(r36, r35) ioctl$PERF_EVENT_IOC_ENABLE(r37, 0x8912, 0x400200) accept$packet(r37, &(0x7f0000000600)={0x11, 0x0, 0x0}, &(0x7f0000000640)=0x14) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r41, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r42}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r43}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r39, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r43}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'erspan0\x00', r43}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000b80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b40)={&(0x7f00000006c0)={0x448, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r15}, {0x17c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3f, 0x2, 0x80, 0x7f}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6b}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x25c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffff283}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd86f}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r38}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r44}}}]}}]}, 0x448}, 0x1, 0x0, 0x0, 0x24044980}, 0x4000000) r45 = socket$inet6_tcp(0xa, 0x1, 0x0) r46 = dup2(r45, r45) setsockopt$IPT_SO_SET_REPLACE(r46, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r47 = dup(0xffffffffffffffff) write$uinput_user_dev(r47, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r2 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000012040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8c68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75925f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r3, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:46 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:46 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = timerfd_create(0x6, 0x80800) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x39) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = getuid() r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r9) sendmsg$unix(r2, &(0x7f00000016c0)={&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{}, {&(0x7f00000002c0)="3d5404719f741cc07f46bb8097071a5fbd93f89e0a9bb5573091f419fda998a25f66b9a22d5fcd70b63ee10c1c8c21164b9d472d8441f3789dc05837fedb8ed8b8dce57910d904061377c62d87e8f9612ca7d5712e42783a5ea8d66e3a995b295d6f0e952806934451642be543954bd551ff87ebdf6c389bc25058587abc37e8bf1d2e453162848b360903d801f7c74f77f9962ece728e99be7d5acee0eebbfd5c1748fdd0104a54b98aeade8ee1eb6aaf1d", 0xb2}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="72c2f6df9de6b8c75cc55082d7215eb543c1dabe0524e86e70ab8e804887e66298f827cc6edc37777ad2ed5d2c743a518c24db58fa94d52626640f98ffb056598dcc6fb59c2f5ccc6a087ea5b8cb66cc694a1c1544b997eafd5e7d60588d2812cb1d4cfa1731", 0x66}, {&(0x7f0000001440)="c7709cdc4ddb892d954f726a6b54706d3313ad45fb1b0b9230878dd01e6b809387e54ef82737301a17d6569393d1bc4e70aeee1534ce5026be875846c07a6eebb9a254e81bda967283e1ed14cf17d831f9b304d1e74d21794e5a6d86f10ed27fb12db3e645f88cf1bf6d1d76dc068a13f5", 0x71}, {&(0x7f00000014c0)="74fccd184d61f9a541235b81b0f071d40a8a6cd8809672f99cad08b3bdbcb0321b8bcc7155b97088da25d59e85f831a9d26028230f89936971f12883817c9d3075ffa38cc34f2997bf35e9c0390178c2081916f185", 0x55}, {&(0x7f0000001540)="1c5ac7cd1bc81d0dfbad6e5ad8845d96d568bac52028e669fa11f1fc9d15fdd44ecac24394ba3d60565d94ab3c861d3971f39bf06018c3aedeef5b2a0a7d661fc4dae4e1ca6cc2a0e8a8213481c653d8c83f95cf918056911f8c419635a3529e6cade3be5a3aeab08a3317b0bbe187f5dfa38694c923717af8ba1a0b727bb54aabca4cd3ded1399d7935b1e88b29dadb3ffadf27571a815c4fe62548a358fdbeaf98998b68e035800a28c54a615aa11e602c0b279e057eed8ff83a33493356e5f4325675b14cc1089b2cb326aa9ad2ba2078163029dafffb090a1b061a174f8af9cf", 0xe2}], 0x7, &(0x7f0000000180)=[@rights={{0x20, 0x1, 0x1, [r0, r3, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}], 0x40, 0x4}, 0x20000000) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) setsockopt$IPT_SO_SET_REPLACE(r11, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r12 = dup(0xffffffffffffffff) write$uinput_user_dev(r12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:46 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) r2 = socket(0x1, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f700402b000000", @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="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", @ANYRES32, @ANYRES32=r4, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) r7 = socket(0x1, 0x2, 0x0) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r6, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f700402b000000", @ANYRES32=r8, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32, @ANYRES32=r9, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) r10 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r11) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) r13 = getgid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r16) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r18 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r18, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) r19 = socket(0x1, 0x2, 0x0) getsockname$packet(r19, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r18, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r20, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f700402b000000", @ANYRES32=r20, @ANYRES32=r17, @ANYBLOB="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", @ANYRES32, @ANYRES32=r21, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) r22 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r22, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r22, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r22, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)={0x340, 0x0, 0x3, [{{0x4, 0x2, 0x53, 0x6, 0x1, 0x4, {0x3, 0x101, 0x9, 0x66, 0x3f, 0x1, 0x3, 0xdb, 0x7, 0x80000001, 0x3, r4, 0xffffffffffffffff, 0x8, 0x1}}, {0x2, 0x4, 0x0, 0x1000}}, {{0x0, 0x2, 0x5, 0xffffffffffff9c99, 0x1, 0x7, {0x2, 0x7, 0xffffffff, 0x8, 0x3a5ac0000000, 0x80000001, 0x4e05, 0x6, 0x1, 0x3, 0x2, r9, r11, 0x6, 0x3f}}, {0x2, 0x2, 0xb, 0x40, '-em1em1:&.('}}, {{0x2, 0x3, 0x3, 0x81, 0x1, 0x3, {0x1, 0x101, 0x269c, 0x0, 0xfffffffffffff801, 0x6, 0x20, 0xfffffffc, 0x2, 0x7, 0xca, r12, r13, 0x4c52, 0x800}}, {0x0, 0x7980, 0x10, 0x17, 'posix_acl_access'}}, {{0x1, 0x2, 0x80, 0x2, 0x5, 0x0, {0x4, 0x7, 0xa, 0x8e0, 0xfad, 0x8, 0x400, 0xffffffff, 0x4, 0x4, 0x3f, r14, r16, 0x10001, 0x3}}, {0x1, 0x0, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x6, 0x3, 0x0, 0x8, 0x9, 0xcf4, {0x2, 0x6, 0x9, 0xffffffff, 0x80000000, 0x401, 0x10, 0x4, 0x40, 0x180000, 0x10000, r21, r23, 0x5, 0x40}}, {0x3, 0x9, 0x3, 0x200, '.\\('}}]}, 0x340) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) r25 = dup2(r24, r24) setsockopt$IPT_SO_SET_REPLACE(r25, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r26 = dup(0xffffffffffffffff) write$uinput_user_dev(r26, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac0100000000000600000001000000000008004608320b2e96f26f0e48f97900f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476795ba085900323e000006700083d1c7cfd3f37b"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10012}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0xc4, r6, 0x121, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x11}}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa7e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x2e3, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x74, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2409a25}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x4800c080) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r8 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r7, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:46 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000100000000007f000300037c2cba"], 0x28}}, 0x0) getegid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:47 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8) 07:14:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:14:47 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x110, 0x110, 0x0, 0x0, 0x0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000100), {[{{@uncond, 0x0, 0xc8, 0x110}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x5, 0x35, 0x8, 'pptp\x00', 0xffffffff}}}, {{@uncond, 0x0, 0xc8, 0x128}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0xffffffff, 0xff, 0xffffff00], 0x4e24, 0x4e21, 0x4e22, 0x4e22, 0x1, 0xffff, 0xde5, 0x400, 0x3ff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:47 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba08590032a90eb357861b81f6c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f36bd68904edc84f6631579380f9333152314da47fb14d6e897daf6d16dfc7a8be28f773220d0ad74fff2089d1ce1b45f774a5361fec9e227dc2d05471df141dc1cea17b29d56ddbe93d32e96aacca263d181e138a3d8174cd76367672985dc0ff716e94beb46a4810ca22a638b8713d6309db5f15ac84ae5b874ffa0a535f0e752a078498b26576ef04450fed9d91bbe4b174d857c09fc5279fa58efea20888490d54204947315a841a02bd36f9319f5f4ed8f11ea6707e86a22d9ff30645cbade036a6eaefa25cf31301aba34dfd75548f360f66868e6d6a48a4bd691e8a687a2bb00"/452], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getrlimit(0x1, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:47 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:48 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r6 = dup3(0xffffffffffffffff, r5, 0x0) ioctl$PIO_FONTX(r6, 0x4b6c, &(0x7f0000000440)="e3571304f8c45cd34ce1a8cd50713ea491b33b47cbff3520c95057b1f99a496ce828c28f4897bbbb83f010d861de22293961656831d37522d4cbea031b71182c50de53b9f4bb1d779398161cabeaa17f966d56e32e9c053a4910a6ddf0a5e0298c7bdb1f645c6c9fe5bb4cdb51a009e06f4bd7f87229db84382a4ab9a18ba22dd2284a882daa993d479c3e668121fcdb078b45bdc039a2dcd2c559c6256823713d52b433392f836538362c8ad29bca673f41e5a5f84d8d999793b56de83406c824e73e3b81187faf0b41389ee8095a4b391fc044dc51f7bc074cefa2") dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:48 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:50 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$char_usb(r2, &(0x7f0000000240)=""/248, 0xf8) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6185000100000000000000000000e4dbb77487e9010400ffff040000000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040000000000"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r6 = dup3(r5, r4, 0x80000) ioctl$UI_DEV_CREATE(r6, 0x5501) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:50 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x6, 0x7f5037c86c5b24aa, 0x9, 0x10000, 0x35f5, 0x6, 0xd3}, 0xed2592dda1006cfb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRES16], 0x2) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36ebe9537217829ae3c72a476a4c0665b17110"}) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) dup3(r3, r2, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7b, 0x8, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r6, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) r7 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r7, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) 07:14:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:51 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff6f000000004f0000011b2300000503f100000ca000cc000000ac0100000000000600000001000000000008000044503f3b03184ce22a553816b24bf30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f24c9814f1f852110e5d4820b060000006b630100000000ffffffffb343cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc0"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)=0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x0, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:51 executing program 4: openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.max.descendants\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) rt_sigaction(0x5, &(0x7f0000000180)={&(0x7f0000000000)="660f1c860400000066440f596f7a64410f5b8c01f2ec0000f0f65275c4810cc6ddd964660f38075b040f01db2646db590766450f38085c5e00c441a1db0cbf", {0x4}, 0x8000000, &(0x7f0000000100)="40b809000000f3a7f22636cfc44225380e66f20f2af5c403096d60003fc4e1cc5862008f097c815810f20f5db1d4f2b21c66410f1a8ae7000000"}, &(0x7f0000000300)={&(0x7f0000000240)="0f01dd410f29530a3666430fdaaedef8d81b0f01fbc462f934ff3e673ef30fbc8969000000f3e1da660f3a6398f3ff7f2007c442f50110400f74c5", {}, 0x0, &(0x7f0000000280)="c441e5eb650064662e6466450f380517c402999da47000000000c4a1fd6f8e8d8500006566660f29a62a150000c4a16bc2a40d000000009e67640fa5a985000000c4e11f5dd4c4c151d0ba6cfee7668f4850862f00"}, 0x8, &(0x7f0000000340)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:51 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) r5 = socket(0x1, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r4, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f700402b000000", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="ac1e0001000000000000000000000000000004d62b000000000000000000000000000000000000011f000000000000000080000000000000000000000000000002b164290000000001010000000000000500000000000000020000000000000006000000000000000000000000000000070000000000000000000080ffffffffff0f00000000000006000000ffff00000600000027bd7000013500000a000620b40000000000000007000000080000003400080030000800010128004e49eece5f7e5b4adcafc9f7595092058eb83986a6f2f8f4ce70912edb51088e0788a208181f0593e4000600fe80000000000000000000000000001dff0100000000000000000000000000014e2400094e2400001400202000000000", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r9, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r8, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x0, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:52 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:52 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r5) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x2, r2}], {0x4, 0x1}, [{0x8, 0x5, r3}, {0x8, 0x1, r5}], {0x10, 0x4}, {0x20, 0x2}}, 0x3c, 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) waitid$P_PIDFD(0x3, r1, 0x0, 0x4, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x0, 0x9, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x0, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:52 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240), &(0x7f0000000240)="ddb0f358516d2605c235b20968e415f4b520e9c00221ed8a1e249d975dfae9611265a0849571a1802379f11a963de8fb58deeca8fdc8f42a2c9abf505d6162990e414de46d583e11e30199a41a21289ffdb48d95b33f9e"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = dup(r4) write$uinput_user_dev(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) utimensat(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x7530}}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x0, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:53 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r2, 0x4000000000000010, 0x9, 0x7fff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x3c39b2a02259b330}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="2800ff06", @ANYRES16=r3, @ANYBLOB="000428bd7000fd08000000000000140006000800010001048e80080001002f0000000cefcd41c9ebd95825a8e7010058853969c1608a00"/65], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400204}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x58, r3, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3858}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r4 = dup(0xffffffffffffffff) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r5, 0x29, 0x18c, &(0x7f0000000400)=0x916, 0x3) sendmmsg(r5, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$sock_buf(r5, 0x1, 0x24412f70c426a84, &(0x7f0000000240)=""/144, &(0x7f0000000000)=0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:53 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000000)={0xf6, 0x200, 0x400, 0xfffffc01, 0x1, 0x6}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000008000000000e4dbb77487e90104004533c8929b269c315180586a0ffdffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820bd6a61bcd6b630100000000ffffffffb341cfe8d68ca3886368f551a6e8476715ba085900323e000006700083d1c7cfd3f37bbfac9645"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = signalfd(r1, &(0x7f0000000180)={0x9}, 0x8) fadvise64(r6, 0x0, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r8 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r7, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x0, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x0, 0x7f, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:53 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000280)=0x4, 0x4) r3 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r4 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x17, &(0x7f0000000180)=0x916, 0xafb5538f113321c8) sendmmsg(r4, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000100)=0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0xffffffff, 0x2, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = dup(0xffffffffffffffff) write$uinput_user_dev(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:53 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffc) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x0, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) ioctl(r2, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:54 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006040000000000000000080000f3020000000000e7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40f3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x0, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6185310002220000010000001bbb7bde8e1bb100000000000000e4dbb77487e99a4a00ffffff7f00000000000000011b2300000503f10000080000cc000000ac01000000000006e8ff00010000000000080000f302d534f440c26c68137713c66900000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {0x3f}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:54 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e901040011ffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x20, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0200000075705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x7, 0x5, 0x401}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f0000000000000001cc000000ac01000000000006000000010000000000080000f30200000000000000f800"/87], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {0x0, 0x80}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) getresgid(&(0x7f0000000100), &(0x7f00000002c0), &(0x7f0000000300)) 07:14:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x0, 0x7, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000000)={{0x2, 0x0, @reserved="25792857dcd8b4432a628cec3fd0d8d8c839075807af730c1082fa1dee6455ce"}}) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@rand_addr, @remote}, &(0x7f0000000100)=0xc) request_key(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000100)=0x6e) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:55 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x800) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r3, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) symlinkat(&(0x7f0000000180)='./file0\x00', r8, &(0x7f0000000200)='./file0\x00') 07:14:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)={0x0, @aes128}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz1\x00', {}, 0x0, [0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479, 0x0, 0x0, 0x0, 0x1ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:55 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:58 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x217, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x60082, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x5b6ebfc9e1199e0a, 0x0) bind$packet(r0, &(0x7f00000002c0)={0x11, 0x1a, 0x0, 0x1, 0x6, 0x6, @remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INFO(r6, 0x0, 0x80, &(0x7f0000000500)={'filter\x00'}, &(0x7f0000000300)=0x78) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)={0x94, r3, 0x1609, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xac3e}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x94}, 0x1, 0x0, 0x0, 0x88800}, 0x4000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x0, 0x2, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:58 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b646d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f00"/211], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) mount$fuse(0x0, 0x0, &(0x7f0000000300)='\xdeuse\x00', 0xa006, &(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYRESHEX=0x0, @ANYBLOB="b79c7e03746d6f64653d30303030303030303030303030303030303032303030302c777365725f69643d5680f65e195d93145e28af0d0968c1adde8e0b84644a3531d971b00b54b552d366fc5a323ac581c9c2ad2e615978b7cdeca99eb8e414c93084a817e8eb73ceede4a3", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) fadvise64(r4, 0x0, 0x10003, 0x8d44d6d26c458dbe) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r8, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0x2}, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x6, 0x7, 0xb987}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x5}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:58 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f0000000000bb9b530000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x5}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006009900010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) socket$inet(0x2, 0x800, 0xdd) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 1285.900407] audit: type=1400 audit(1573542898.489:49): avc: denied { create } for pid=7574 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 07:14:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:58 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) accept4$packet(r2, 0x0, &(0x7f0000000100), 0x1c1400) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r4, &(0x7f0000000000)='net\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) r2 = socket$inet6(0xa, 0x80003, 0x8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) setfsgid(r5) fchown(r1, r3, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_mreq(r8, 0x0, 0x24, &(0x7f0000000100)={@multicast1, @multicast1}, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$ppp(r11, &(0x7f0000000240)="e241a5ba1d8644972e5212588dd0546f1d694e49a8d22c07bd9ae810236630aa9c3e140f17f9000cd22fd47f300d92d5d813594cc6ee69a6e9ccf1a32f266be672f01e9c2083ea615dad0f3274d7bb67c3fe180f2468a24f1d94158122997947e4f3fc717fc5b38000922fb7bcfcf90c99817704e09d905c33fe084b669b4bd3dbc7c891f49bbc0ab9ac57c9be4ddb106f0e86583908e504baa380bd5350f1658d7a01e342d242e9a1fb0b09cc9bcd4ee3850c718330", 0xb6) setsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000440)=""/164, &(0x7f0000000000)=0xa4) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303032303030302c757390be2665725f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="30253c397cea22b1a22c7a37833100"]) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:14:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:59 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000004c0)=@nat={'nat\x00', 0x1b, 0x5, 0x520, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x488, 0x488, 0x488, 0x488, 0x488, 0x5, &(0x7f0000000440), {[{{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id=0x68, @port=0x4e24}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x11}, @broadcast, 0xffffff00, 0x1fffffeff, 'veth1\x00', 'syzkaller0\x00', {}, {0xff}, 0x32, 0x2}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x1, 0x16, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x14, @empty, @empty, @gre_key=0xfff8, @icmp_id=0x65}}}}, {{@ip={@remote, @multicast1, 0x2d47f42e9b5323f0, 0xff, 'vlan0\x00', 'vlan0\x00', {}, {0xff}, 0xd7, 0x1, 0xa8}, 0x0, 0x110, 0x148, 0x0, {}, [@common=@inet=@dscp={0x28, 'dscp\x00', 0x0, {0xcf, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x400, 0xd81576c5a9ee27eb, 0x2, 0x2}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x5, @dev={0xac, 0x14, 0x14, 0xa}, @multicast1, @port=0x4e21, @icmp_id=0x68}}}}, {{@ip={@broadcast, @multicast2, 0xffffffff, 0xff000000, 'lo\x00', 'ipddp0\x00', {}, {0xff}, 0x1d, 0x0, 0x20}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@unspec=@time={0x38, 'time\x00', 0x0, {0x800, 0x36013fca, 0x1358c, 0x11a43, 0x80000000, 0xb2, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="dee54fecab9f", 0x7, 0x4, [0x0, 0x1d, 0x30, 0x3c, 0x30, 0x38, 0x8, 0xe, 0x14, 0x17, 0x3d, 0x32, 0x1b, 0x6, 0x2f, 0x2d], 0x2, 0x2, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x580) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:14:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64650000000030600034e96db06aac30153030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) sched_getattr(r2, &(0x7f00000001c0)={0x30}, 0x30, 0x6ec180c899a8dd61) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:14:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:14:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x0, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:14:59 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:00 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000000)='syz1\x00') pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00e2ffffff0000011b23000005870f07610000010000000000080000f30200000000000000f859e936b50ea4bcec074a93d056a81e58b3df68a7d13988c2d825497fc7db5c864bd4deeac5e6c5fcc572335cfe903b56d428267ad69e3cf087ca031de65d96b8ab73dca6910a7b63a9a4b80d54dbc6097324b9d5e9a4f7e8c512892207f82b9965b2e75bc0f9f7ff5e0fe253f300592508fcdd1189a2bb022aea2086cc1041052ad5dfa505"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000440)="77d2004e380f00f3e3ceb887ed63220e3f271a0632e082af4b294a7a9fa51a9bd56519872a72026c295eba246e74769b64a6d32ae6ae8dd876e624e364d58b0b37165938077c202551b97f833afec2869c2a29544498cb34290d9fb8747992fecb94f81745dbb2d8a40e39ca5b01d5f9e950f9908503ac9089cd9e8c8910534960cf4cf37d351d65bbf33b159e0fb014904c7a6987be8f1f2cdc76fd44caf29be327462ab6fe507cbda5c639ba25aea5d1afa864863db5f61ab54d4cdbff", 0xbe) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb7ff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f80000000000000000"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="668538", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:02 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0x3, 0x4) r2 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000edffffffb341cfe8d68c26b866cd06700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r4, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@uid_eq={'uid', 0x3d, r5}}]}}) fadvise64(r3, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r7 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r7, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r6, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:02 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r5 = dup(0xffffffffffffffff) write$uinput_user_dev(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:02 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffd87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) socket$inet6_tcp(0xa, 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:02 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:02 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0xa3, 0x1, 0x2}}, 0x14) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00449f5a51f965b19656c7bfc93325306a23a7d402c2e0167af72670033bad1a248fa8b104e33861b92f060ee8084df8853afa7161e904d035e39f0fb6a955f668e97d80ded4c69930e1e769fde9be40883481786939c53f64e06b204d2488c4cc92bfb6e6fbea2d830e72e5352e1fee732a1a5399d5fb3f1fb2b85aba70e9c223ea0bb7b1ef56fe65deec37a0e2a3475abd2adbc60b92e8ac11e1e5f65e3bab4885f2597def9eb349011e16a0e4b085f9269fbdfd1d16cd17cba53333fea6bc28191f1afb1c140e98e0ac096cc1574a796af30069ee24ac"]) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:03 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac0100000000000600000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040000000000"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r3, 0xfffffe18, 0x0}, 0x2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r4 = dup(0xffffffffffffffff) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:03 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000089000000000000011b2300000503f10000000000cc000000ac0100000000000600000001000000010000000000f80000e7b8bbb76cab10040000100400"/93], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r6 = fcntl$dupfd(r4, 0x0, r5) fstat(r6, &(0x7f0000000240)) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:03 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r1, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000000)=""/43) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:03 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) ioctl$KDSKBLED(r3, 0x4b65, 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:03 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e"], 0x0, 0x8a}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x94000) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd8, 0x80, 0x1, 0xfd, 0x0, 0x6db5, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x1}, 0x80, 0x7d0651a8, 0x200, 0x4, 0x5, 0x0, 0x1}, r1, 0xe, r2, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75707f69643d", @ANYRESDEC=0x0, @ANYBLOB="954c006e00000000000000000000000000ae73b245378ee2a74fb0723e9db7d05ab21bdd081ce4e444ba1e32377aa3f886423deb9063df3728fd366c20b7063ee540dc9850121fe4e3571b13ca06a139"]) 07:15:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:04 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00001fc2d716196f489af9e54083ed954d9613d97704a4aa92cd0de75104dc43542dd6aa945a3897c1a5349a4f019feb79a52c4c81ef20882dbd950c48455a79f89c51f27c6e6b834d741691822b3a9e61e51414308245669e972411842750bea8ec0b8622ee18308b956a7a8a74b25531fd78f41a1b77fc9d903c743de2bd409007151142684380e5e6fc16ae9e1f99c17d1f67794c0121699740b4c0f076766a9f5e8640b30d703d6023e30fec674a323079b3b43f23691d04dc0f667b0784ded8a636fdab6b4e4fb5799ba937e4f66ee2c5a30f4eecb4e7f7113094d30bfcf9f286cc9266"]) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fcntl$getflags(r5, 0xb) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:04 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = dup(r2) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0xffffffffffffffe4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r5, &(0x7f00000000c0), &(0x7f0000000100)="e5b7a5587c3ffc7ac136a603bea2a4299ceeac1090997a076459"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) tee(r4, r5, 0xffffffff, 0xf) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48888c48}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x48, r5, 0x400, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf317}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x450f12371757732a) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x9000}, 0x2c, {'user_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:04 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xfffffd2c, 0x10}, 0xc) 07:15:05 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10cca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) fdatasync(r2) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) accept$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000100)=0x6e) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:07 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x13, 0x2, 0x81, 0xfffff001, 0x24, r0, 0xfffffffb, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r4, 0x0, 0x40) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77b87e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080004f30200000000000000f8000ae7b8bbb76cab44ee3c71bd1d"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) lseek(r6, 0x5, 0x1) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f0000000240)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0xc0045878) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:07 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0x46) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) r2 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000e00)=@nat={'nat\x00', 0x1b, 0x5, 0x588, 0x238, 0x238, 0x238, 0x110, 0x238, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x5, &(0x7f0000000000), {[{{@ipv6={@dev={0xfe, 0x80, [], 0xe}, @mcast1, [0xff, 0x8ea9558371a9f870, 0x0, 0xff000000], [0x0, 0xff000000, 0xff], 'gretap0\x00', 'ip6erspan0\x00', {}, {}, 0xff, 0x1, 0x4, 0x6}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x101, 0xffffffffc220521f}}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x234, 0x0, 0x8}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x8, 0xff, 0x3}, {0x5}, {0x0, 0x5, 0x5}, 0x6, 0x3eb4}}}, {{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x4, @ipv4=@multicast2, @ipv6=@local, @port=0x4e24, @gre_key=0xd700}}}, {{@ipv6={@ipv4={[], [], @empty}, @loopback, [0xffffff, 0xffffffff, 0xff, 0xffffff00], [0xff000000, 0xffffff00, 0x0, 0xff], 'bridge_slave_1\x00', 'bond0\x00', {}, {0x80}, 0x3a, 0x80, 0x7ddca3e5f0126eab, 0xaba80867dd4da7a5}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x2c, 0x40, 0xae, 0x1f, 0x101, 0x70}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d5, 0x10000, 0xa4, 0x3}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x8, @ipv4=@broadcast, @ipv4=@broadcast, @port=0x4e21, @gre_key=0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e8) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:07 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:07 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01f3ffffffff050000000100006f98d712ff000000080000f39cad2bf70200020000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f076715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22d"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f89717e80d263bc5eb601fb2dad620a69d772c9c2f0abc840e15ab733eeab19898d1bf83894cc0287bef980445f029138f2092934c14b8d936a3b33fb825a499d817983960565fe24335fa8a7942b6628cfc03a465c08e1a5ddd7eecaf6c"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:08 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f302000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3fc5d826440abb0e7542cbbc4a36f6c2498424efdcebcc99607164f234022961b8eaabcc419865dcb806ca26e61049bfe595cb203a84480a08e4cec3c73b61ea47a33246f80fcf23acdc4a44b8ab579922996db4a9694974eb60c96d9197034ab7618d02290df7c6db9d6aaf6ddaf65668578e050fb03b573200"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_yield() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:08 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000097765cd66843186500e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac0100f6ffffff06000000010000000000080000f302"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) [ 1295.969266] syz-executor.0: vmalloc: allocation failure: 17179868160 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1295.996471] CPU: 0 PID: 8010 Comm: syz-executor.0 Not tainted 4.9.194+ #0 [ 1296.003434] ffff88017d4af858 ffffffff81b67001 1ffff1002fa95f0d ffff8801af262f80 [ 1296.011472] ffffffff82aab4e0 0000000000000001 0000000000400000 ffff88017d4af980 [ 1296.019487] ffffffff815080fc 0000000041b58ab3 ffffffff82e3bc80 ffffffff81431d00 [ 1296.027518] Call Trace: [ 1296.030097] [<0000000068e25175>] dump_stack+0xc1/0x120 [ 1296.035463] [<0000000054d7f24e>] warn_alloc.cold+0x76/0x93 [ 1296.041156] [<00000000b09bb2da>] ? zone_watermark_ok_safe+0x260/0x260 [ 1296.047803] [<00000000b9402678>] ? retint_kernel+0x2d/0x2d [ 1296.053495] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1296.060321] [<0000000053e6d8a1>] ? __kmalloc+0x1b2/0x320 [ 1296.065841] [<00000000d46c1f8e>] __vmalloc_node_range+0x368/0x610 [ 1296.072143] [<00000000914b520d>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 1296.078980] [<000000004a398970>] vmalloc+0x5c/0x70 [ 1296.084028] [<00000000c4b9eb78>] ? xt_alloc_entry_offsets+0x44/0x50 [ 1296.090547] [<00000000c4b9eb78>] xt_alloc_entry_offsets+0x44/0x50 [ 1296.096852] [<000000009ab10011>] translate_table+0x215/0x1650 [ 1296.102806] [<000000003ae56ac4>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 1296.109627] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1296.116450] [<00000000b9402678>] ? retint_kernel+0x2d/0x2d [ 1296.122140] [<0000000001c8b29f>] ? compat_do_ipt_get_ctl+0x8c0/0x8c0 [ 1296.128699] [<00000000c3c43e00>] do_ipt_set_ctl+0x2d4/0x470 [ 1296.134478] [<000000004394fc46>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 1296.141036] [<00000000e2a93f40>] ? mutex_unlock+0x9/0x10 [ 1296.146556] [<000000001918843e>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 1296.153639] [<0000000057dac1ac>] nf_setsockopt+0x6d/0xc0 [ 1296.159159] [<0000000007a6f3bf>] ip_setsockopt+0x8a/0xa0 [ 1296.164676] [<000000003a76fa2b>] udp_setsockopt+0x4e/0x90 [ 1296.170280] [<00000000c549f23b>] ipv6_setsockopt+0xa4/0x140 [ 1296.176062] [<00000000640864dd>] tcp_setsockopt+0x8a/0xe0 [ 1296.181667] [<00000000eab59af6>] sock_common_setsockopt+0x9a/0xe0 [ 1296.187969] [<00000000762b3f2f>] SyS_setsockopt+0x159/0x240 [ 1296.193744] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1296.199018] [<000000005aecc47a>] ? SyS_clock_gettime+0x118/0x1f0 [ 1296.205247] [<0000000034ded630>] ? do_syscall_64+0x4a/0x5c0 [ 1296.211031] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1296.216287] [<00000000e294b301>] do_syscall_64+0x1ad/0x5c0 [ 1296.221982] [<00000000239f1e32>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1296.236616] Mem-Info: [ 1296.256471] active_anon:111127 inactive_anon:311 isolated_anon:0 [ 1296.256471] active_file:10562 inactive_file:34899 isolated_file:0 [ 1296.256471] unevictable:0 dirty:7554 writeback:0 unstable:0 [ 1296.256471] slab_reclaimable:8567 slab_unreclaimable:65886 [ 1296.256471] mapped:59484 shmem:333 pagetables:17270 bounce:0 [ 1296.256471] free:1328271 free_pcp:561 free_cma:0 07:15:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) [ 1296.371134] Node 0 active_anon:444632kB inactive_anon:1252kB active_file:42256kB inactive_file:139596kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237888kB dirty:30224kB writeback:0kB shmem:1332kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no 07:15:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) [ 1296.525759] DMA32 free:3010440kB min:4696kB low:7712kB high:10728kB active_anon:72kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:464kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1452kB local_pcp:728kB free_cma:0kB [ 1296.614116] lowmem_reserve[]: 0 3505 3505 07:15:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) [ 1296.631796] Normal free:2301204kB min:5580kB low:9168kB high:12756kB active_anon:444660kB inactive_anon:1252kB active_file:42256kB inactive_file:139592kB unevictable:0kB writepending:30224kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:34268kB slab_unreclaimable:263276kB kernel_stack:25728kB pagetables:69532kB bounce:0kB free_pcp:1128kB local_pcp:524kB free_cma:0kB 07:15:09 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = getegid() request_key(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400000503f10000000000cc000000ac0100000000010000000000849bc790b651080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000106b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f00"/217], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r6, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r7, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r7, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r8, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r8, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r9, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r9, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r10, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r10, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x21, &(0x7f0000000540)=ANY=[@ANYRES16, @ANYRES32=r6, @ANYRESOCT=r7, @ANYRESDEC=r1, @ANYRES16, @ANYRESOCT=r10, @ANYPTR, @ANYRES16=r0, @ANYRESHEX, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRESOCT=r5, @ANYBLOB="f6dfae29179d76049b7c0e4a2ff519a3403dd5ad5710c82399cfbab96bf2cab58b8679c877904c7b92c08707ef0e3589d7a2599aba683c3518024ef023ae4b640938c90abe1b097212c7ea2029ae16b98d2171dc90298658bfb2ee921c9b3231db5e9dc57a653414e7807c248072d08bfc155ac2f8b310865dad101a4a357059548502753f622d1c714d3f51bc637c4721426d5da901fcb2c8ff5af5b5", @ANYRES32=r4, @ANYPTR64, @ANYRES16=r6, @ANYRES32, @ANYRES32=r7, @ANYRESDEC=r9]]) fadvise64(r5, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r12 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r12, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r11, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:15:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) [ 1296.770774] syz-executor.0: vmalloc: allocation failure: 17179868160 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1296.770786] CPU: 1 PID: 8039 Comm: syz-executor.0 Not tainted 4.9.194+ #0 [ 1296.770803] ffff8801aadf7858 ffffffff81b67001 1ffff100355bef0d ffff8801a6edc740 07:15:09 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x5, 0x4a, 0x8, 0x6, 0x0, 0xfff, 0x2000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10, 0x8, 0x5, 0x7, 0x4, 0x1ff, 0x8}, r4, 0xc, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$PPPIOCDISCONN(r4, 0x7439) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r6 = dup(0xffffffffffffffff) write$uinput_user_dev(r6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 1296.770815] ffffffff82aab4e0 0000000000000001 0000000000400000 ffff8801aadf7980 [ 1296.770826] ffffffff815080fc 0000000041b58ab3 ffffffff82e3bc80 ffffffff81431d00 [ 1296.770829] Call Trace: [ 1296.770842] [<0000000068e25175>] dump_stack+0xc1/0x120 [ 1296.770855] [<0000000054d7f24e>] warn_alloc.cold+0x76/0x93 [ 1296.770865] [<00000000b09bb2da>] ? zone_watermark_ok_safe+0x260/0x260 [ 1296.770878] [<00000000301b743c>] ? save_stack_trace+0x16/0x20 07:15:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) [ 1296.770887] [<00000000b0d7aa29>] ? kasan_kmalloc.part.0+0x62/0xf0 [ 1296.770896] [<00000000f4950285>] ? kasan_kmalloc+0xb7/0xd0 07:15:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) [ 1296.770903] [<000000000b544af7>] ? __kmalloc+0x133/0x320 [ 1296.770914] [<0000000009ad462b>] ? xt_alloc_table_info+0x6f/0x100 [ 1296.770922] [<00000000eda34e06>] ? do_ipt_set_ctl+0x231/0x470 [ 1296.770930] [<0000000007a6f3bf>] ? ip_setsockopt+0x8a/0xa0 [ 1296.770939] [<00000000d46c1f8e>] __vmalloc_node_range+0x368/0x610 [ 1296.770947] [<00000000914b520d>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 1296.770953] [<000000004a398970>] vmalloc+0x5c/0x70 [ 1296.770961] [<00000000c4b9eb78>] ? xt_alloc_entry_offsets+0x44/0x50 [ 1296.770969] [<00000000c4b9eb78>] xt_alloc_entry_offsets+0x44/0x50 [ 1296.770975] [<000000009ab10011>] translate_table+0x215/0x1650 [ 1296.770983] [<00000000a23e22bf>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1296.770990] [<0000000001c8b29f>] ? compat_do_ipt_get_ctl+0x8c0/0x8c0 [ 1296.771000] [<0000000095d5d51a>] ? __check_object_size+0x257/0x335 [ 1296.771007] [<00000000c3c43e00>] do_ipt_set_ctl+0x2d4/0x470 [ 1296.771014] [<000000004394fc46>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 1296.771022] [<00000000e2a93f40>] ? mutex_unlock+0x9/0x10 [ 1296.771032] [<000000001918843e>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 1296.771040] [<0000000057dac1ac>] nf_setsockopt+0x6d/0xc0 [ 1296.771047] [<0000000007a6f3bf>] ip_setsockopt+0x8a/0xa0 [ 1296.771055] [<000000003a76fa2b>] udp_setsockopt+0x4e/0x90 [ 1296.771062] [<00000000c549f23b>] ipv6_setsockopt+0xa4/0x140 [ 1296.771070] [<00000000640864dd>] tcp_setsockopt+0x8a/0xe0 [ 1296.771079] [<00000000eab59af6>] sock_common_setsockopt+0x9a/0xe0 [ 1296.771088] [<00000000762b3f2f>] SyS_setsockopt+0x159/0x240 [ 1296.771096] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1296.771104] [<000000005aecc47a>] ? SyS_clock_gettime+0x118/0x1f0 [ 1296.771112] [<0000000034ded630>] ? do_syscall_64+0x4a/0x5c0 [ 1296.771120] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1296.771127] [<00000000e294b301>] do_syscall_64+0x1ad/0x5c0 [ 1296.771136] [<00000000239f1e32>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1296.771145] Mem-Info: [ 1296.771167] active_anon:111208 inactive_anon:313 isolated_anon:0 [ 1296.771167] active_file:10564 inactive_file:34899 isolated_file:0 [ 1296.771167] unevictable:0 dirty:7556 writeback:0 unstable:0 [ 1296.771167] slab_reclaimable:8567 slab_unreclaimable:66049 [ 1296.771167] mapped:59472 shmem:333 pagetables:17346 bounce:0 [ 1296.771167] free:1327834 free_pcp:633 free_cma:0 [ 1296.771185] Node 0 active_anon:444832kB inactive_anon:1252kB active_file:42256kB inactive_file:139596kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237888kB dirty:30224kB writeback:0kB shmem:1332kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1296.771205] DMA32 free:3010440kB min:4696kB low:7712kB high:10728kB active_anon:72kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:464kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1452kB local_pcp:724kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1296.771233] Normal free:2300896kB min:5580kB low:9168kB high:12756kB active_anon:444760kB inactive_anon:1252kB active_file:42256kB inactive_file:139592kB unevictable:0kB writepending:30224kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:34268kB slab_unreclaimable:263732kB kernel_stack:25792kB pagetables:69384kB bounce:0kB free_pcp:1080kB local_pcp:524kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1296.771287] DMA32: 18*4kB (UM) 14*8kB (UM) 9*16kB (UM) 16*32kB (UM) 9*64kB (UM) 8*128kB (UM) 8*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 4*2048kB (UM) 731*4096kB (UM) = 3010440kB 07:15:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:10 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0xffff45ea, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffffe, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000000)={0x18, 0x0, 0x2, {0x9}}, 0x18) 07:15:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:10 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00a7315aa548e1db2e84ab00"]) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) Normal: 261*4kB (UM) 221*8kB (UME) 84*16kB (UME) 120*32kB (UME) 327*64kB (UME) 237*128kB (UME) 120*256kB (UME) 94*512kB (UME) 60*1024kB (UM) 38*2048kB (UME) 494*4096kB (U) = 2300796kB 45780 total pagecache pages [ 1296.771341] 0 pages in swap cache [ 1296.771346] Swap cache stats: add 0, delete 0, find 0/0 [ 1296.771348] Free swap = 0kB [ 1296.771350] Total swap = 0kB [ 1296.771352] 1965979 pages RAM [ 1296.771355] 0 pages HighMem/MovableOnly [ 1296.771357] 313627 pages reserved [ 1297.816593] lowmem_reserve[]: 0 0 0 [ 1297.816642] DMA32: 18*4kB (UM) 14*8kB (UM) 9*16kB (UM) 16*32kB (UM) 9*64kB (UM) 8*128kB (UM) 8*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 4*2048kB (UM) 731*4096kB (UM) = 3010440kB Normal: 718*4kB (UME) 325*8kB (UME) 134*16kB (UME) 205*32kB (UME) 284*64kB (UME) 218*128kB (UME) 120*256kB (UME) 94*512kB (UME) 60*1024kB (UM) 38*2048kB (UME) 494*4096kB (U) = 2301792kB 07:15:10 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000100)=ANY=[], 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r2 = dup(0xffffffffffffffff) write$uinput_user_dev(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 45790 total pagecache pages [ 1297.816689] 0 pages in swap cache [ 1297.816693] Swap cache stats: add 0, delete 0, find 0/0 [ 1297.816694] Free swap = 0kB [ 1297.816696] Total swap = 0kB [ 1297.816699] 1965979 pages RAM 07:15:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) [ 1297.816700] 0 pages HighMem/MovableOnly [ 1297.816702] 313627 pages reserved 07:15:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b230000d60503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r0, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:11 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='c\x93\x9f\x0epuset.effective_cpus\x00\xaf\xd6\x12\xcf\xb2\xf6@`\x7f]l \r\xa7\xf9.\xd9\xb0\xa7#>\x94\xd2\t\xbb\x13Xa}s\xb5\xba\x91\xe0Y>1v\xe8.)\x89\xad\x02\x1c\x02\xfb\xee\x86i\x0e\x00\xb4zh\x16', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r6 = dup2(r1, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r7 = dup(0xffffffffffffffff) write$uinput_user_dev(r7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8"], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000x0000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x1}) dup2(r2, r3) r4 = openat$cgroup_ro(r2, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r6, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) connect(r7, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r8 = gettid() r9 = gettid() sendmmsg$unix(r7, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x3}, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f8a50000"], 0x70}], 0x437, 0x2000040) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r5, 0x10, 0x70bd28, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r9}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004020) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)={0x130, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x3}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x3}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x2}}]}, 0x130}, 0x1, 0x0, 0x0, 0x440000a0}, 0x30080) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r0, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) [ 1302.049918] lowmemorykiller: Killing 'syz-executor.2' (1206) (tgid 1206), adj 1000, [ 1302.049918] to free 35988kB on behalf of 'kswapd0' (33) because [ 1302.049918] cache 59992kB is below limit 65536kB for oom_score_adj 12 [ 1302.049918] Free memory is -11260kB above reserved [ 1302.053778] lowmemorykiller: Killing 'syz-executor.1' (5094) (tgid 5094), adj 1000, [ 1302.053778] to free 36004kB on behalf of 'syz-executor.1' (8100) because [ 1302.053778] cache 64892kB is below limit 65536kB for oom_score_adj 12 [ 1302.053778] Free memory is -11148kB above reserved [ 1302.065755] lowmemorykiller: Killing 'syz-executor.4' (3494) (tgid 3494), adj 1000, [ 1302.065755] to free 35988kB on behalf of 'syz-executor.1' (8100) because [ 1302.065755] cache 59592kB is below limit 65536kB for oom_score_adj 12 [ 1302.065755] Free memory is -13064kB above reserved [ 1302.071103] lowmemorykiller: Killing 'syz-executor.2' (1234) (tgid 1234), adj 1000, [ 1302.071103] to free 35984kB on behalf of 'syz-executor.1' (8100) because [ 1302.071103] cache 59292kB is below limit 65536kB for oom_score_adj 12 [ 1302.071103] Free memory is -13032kB above reserved [ 1302.071113] [ 1302.071115] ================================= [ 1302.071116] [ INFO: inconsistent lock state ] [ 1302.071121] 4.9.194+ #0 Not tainted [ 1302.071123] --------------------------------- [ 1302.071126] inconsistent {RECLAIM_FS-ON-W} -> {IN-RECLAIM_FS-R} usage. [ 1302.071133] syz-executor.1/8100 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 1302.071153] (&mm->mmap_sem){+++++?}, at: [<000000007de9a021>] get_cmdline+0xa3/0x2d0 {RECLAIM_FS-ON-W} state was registered at: [ 1302.071165] mark_held_locks+0xb1/0x100 [ 1302.071171] lockdep_trace_alloc+0x18c/0x2b0 [ 1302.071178] __alloc_pages_nodemask+0x143/0x1a80 [ 1302.071185] __pmd_alloc+0x4a/0x330 [ 1302.071191] move_page_tables+0xadb/0xd60 [ 1302.071197] shift_arg_pages+0x1ae/0x470 [ 1302.071203] setup_arg_pages+0x60d/0x7c0 [ 1302.071212] load_elf_binary+0xa84/0x4a90 [ 1302.071217] search_binary_handler+0x14f/0x700 [ 1302.071223] do_execveat_common.isra.0+0xf81/0x1db0 [ 1302.071228] do_execve+0x3a/0x50 [ 1302.071236] run_init_process+0x33/0x37 [ 1302.071243] try_to_run_init_process+0x18/0x48 [ 1302.071251] kernel_init+0xf2/0x163 [ 1302.071256] ret_from_fork+0x5c/0x70 [ 1302.071259] irq event stamp: 1559307 [ 1302.071267] hardirqs last enabled at (1559307): [<000000001148ef52>] vprintk_emit+0x25c/0x6f0 [ 1302.071274] hardirqs last disabled at (1559306): [<00000000a33c5a33>] vprintk_emit+0x6d/0x6f0 [ 1302.071282] softirqs last enabled at (1557182): [<000000003aa14ab4>] wb_queue_work+0x1ed/0x450 [ 1302.071289] softirqs last disabled at (1557178): [<000000009c026a0a>] wb_queue_work+0x90/0x450 [ 1302.071291] [ 1302.071291] other info that might help us debug this: [ 1302.071292] Possible unsafe locking scenario: [ 1302.071292] [ 1302.071294] CPU0 [ 1302.071295] ---- [ 1302.071299] lock(&mm->mmap_sem); [ 1302.071300] [ 1302.071304] lock(&mm->mmap_sem); [ 1302.071306] [ 1302.071306] *** DEADLOCK *** [ 1302.071306] [ 1302.071309] 1 lock held by syz-executor.1/8100: [ 1302.071323] #0: (shrinker_rwsem){++++..}, at: [<00000000ce396612>] shrink_slab.part.0+0xb2/0xa20 [ 1302.071325] [ 1302.071325] stack backtrace: [ 1302.071332] CPU: 0 PID: 8100 Comm: syz-executor.1 Not tainted 4.9.194+ #0 [ 1302.071347] ffff88018184eff0 ffffffff81b67001 00000000000000f0 ffff88018f8a97c0 [ 1302.071357] ffffffff83cb07e0 ffff88018f8aa0b8 ffffffff84252000 ffff88018184f068 [ 1302.071366] ffffffff81408710 0000000000000000 ffffffff00000001 0000000000000001 [ 1302.071368] Call Trace: [ 1302.071377] [<0000000068e25175>] dump_stack+0xc1/0x120 [ 1302.071388] [<00000000a7c53768>] print_usage_bug.cold+0x452/0x5a2 [ 1302.071395] [<000000004fc9daa6>] mark_lock+0x6c7/0x12e0 [ 1302.071402] [<000000000eb51b04>] ? print_irq_inversion_bug+0xa0/0xa0 [ 1302.071409] [<000000008b550fa7>] __lock_acquire+0x5be/0x4390 [ 1302.071417] [<000000003ea0dd09>] ? trace_hardirqs_on+0x10/0x10 [ 1302.071424] [<000000003ea0dd09>] ? trace_hardirqs_on+0x10/0x10 [ 1302.071433] [<00000000a23e22bf>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1302.071440] [<0000000094ceeb07>] lock_acquire+0x133/0x3d0 [ 1302.071446] [<000000007de9a021>] ? get_cmdline+0xa3/0x2d0 [ 1302.071453] [<000000005f8c94ec>] down_read+0x44/0xb0 [ 1302.071459] [<000000007de9a021>] ? get_cmdline+0xa3/0x2d0 [ 1302.071466] [<000000007de9a021>] get_cmdline+0xa3/0x2d0 [ 1302.071476] [<000000009d90ff8f>] handle_lmk_event+0x169/0x920 [ 1302.071484] [<00000000eb1fc742>] ? lmk_event_show+0x390/0x390 [ 1302.071490] [<00000000c33321f9>] ? vprintk+0x28/0x30 [ 1302.071497] [<00000000a23e22bf>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1302.071506] [<00000000edbba8a1>] ? kill_pid_info_as_cred+0x540/0x540 [ 1302.071515] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1302.071528] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1302.071536] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1302.071543] [<00000000278bd0d5>] ? lowmem_scan+0x6ae/0xb70 [ 1302.071550] [<0000000082c29e8f>] lowmem_scan+0x6f3/0xb70 [ 1302.071558] [<000000002ae80f6d>] shrink_slab.part.0+0x3cf/0xa20 [ 1302.071567] [<00000000cd6735db>] ? unregister_shrinker+0x230/0x230 [ 1302.071575] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1302.071583] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1302.071591] [<000000000435d569>] shrink_node+0x1ed/0x750 [ 1302.071599] [<000000006cf8a441>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 1302.071607] [<00000000a3098820>] ? wakeup_flusher_threads+0x27c/0x480 [ 1302.071614] [<00000000993627d4>] ? wakeup_flusher_threads+0xdb/0x480 [ 1302.071622] [<00000000a8c91cc5>] try_to_free_pages+0x397/0xbd0 [ 1302.071629] [<0000000036b6f1a1>] ? shrink_node+0x750/0x750 [ 1302.071637] [<00000000b8d50ebe>] __alloc_pages_nodemask+0x930/0x1a80 [ 1302.071644] [<00000000b9402678>] ? retint_kernel+0x2d/0x2d [ 1302.071652] [<000000001631f730>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.071659] [<0000000098031320>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 1302.071666] [<00000000b9402678>] ? retint_kernel+0x2d/0x2d [ 1302.071675] [<00000000de850046>] __vmalloc_node_range+0x25b/0x610 [ 1302.071685] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1302.071692] [<000000004a398970>] vmalloc+0x5c/0x70 [ 1302.071699] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1302.071707] [<0000000018f2fe98>] xt_alloc_table_info+0xc8/0x100 [ 1302.071715] [<00000000eda34e06>] do_ipt_set_ctl+0x231/0x470 [ 1302.071722] [<000000004394fc46>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 1302.071729] [<0000000064ff5b0f>] ? do_ipt_set_ctl+0x2d/0x470 [ 1302.071738] [<0000000057dac1ac>] nf_setsockopt+0x6d/0xc0 [ 1302.071746] [<0000000007a6f3bf>] ip_setsockopt+0x8a/0xa0 [ 1302.071755] [<000000003a76fa2b>] udp_setsockopt+0x4e/0x90 [ 1302.071763] [<00000000c549f23b>] ipv6_setsockopt+0xa4/0x140 [ 1302.071770] [<00000000640864dd>] tcp_setsockopt+0x8a/0xe0 [ 1302.071780] [<00000000eab59af6>] sock_common_setsockopt+0x9a/0xe0 [ 1302.071788] [<00000000762b3f2f>] SyS_setsockopt+0x159/0x240 [ 1302.071795] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1302.071804] [<000000005aecc47a>] ? SyS_clock_gettime+0x118/0x1f0 [ 1302.071812] [<0000000034ded630>] ? do_syscall_64+0x4a/0x5c0 [ 1302.071819] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1302.071825] [<00000000e294b301>] do_syscall_64+0x1ad/0x5c0 [ 1302.071833] [<00000000239f1e32>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1302.074356] lowmemorykiller: Killing 'syz-executor.1' (5094) (tgid 5094), adj 1000, [ 1302.074356] to free 36004kB on behalf of 'syz-executor.1' (8107) because [ 1302.074356] cache 60792kB is below limit 65536kB for oom_score_adj 12 [ 1302.074356] Free memory is -12260kB above reserved [ 1302.080875] lowmemorykiller: Killing 'syz-executor.4' (3295) (tgid 3295), adj 1000, [ 1302.080875] to free 35984kB on behalf of 'syz-executor.1' (8107) because [ 1302.080875] cache 58792kB is below limit 65536kB for oom_score_adj 12 [ 1302.080875] Free memory is -13132kB above reserved [ 1302.084647] lowmemorykiller: Killing 'syz-executor.4' (4113) (tgid 4113), adj 1000, [ 1302.084647] to free 35984kB on behalf of 'syz-executor.1' (8107) because [ 1302.084647] cache 58392kB is below limit 65536kB for oom_score_adj 12 [ 1302.084647] Free memory is -13072kB above reserved [ 1302.112100] lowmemorykiller: Killing 'syz-executor.5' (4209) (tgid 4209), adj 1000, [ 1302.112100] to free 35984kB on behalf of 'syz-executor.1' (8107) because [ 1302.112100] cache 55792kB is below limit 65536kB for oom_score_adj 12 [ 1302.112100] Free memory is -12972kB above reserved [ 1302.115541] lowmemorykiller: Killing 'syz-executor.4' (4334) (tgid 4334), adj 1000, [ 1302.115541] to free 35984kB on behalf of 'syz-executor.1' (8100) because [ 1302.115541] cache 55492kB is below limit 65536kB for oom_score_adj 12 [ 1302.115541] Free memory is -13072kB above reserved [ 1302.119234] lowmemorykiller: Killing 'syz-executor.5' (15186) (tgid 15186), adj 1000, [ 1302.119234] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.119234] cache 54892kB is below limit 65536kB for oom_score_adj 12 [ 1302.119234] Free memory is -13108kB above reserved [ 1302.122045] lowmemorykiller: Killing 'syz-executor.5' (15546) (tgid 15546), adj 1000, [ 1302.122045] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.122045] cache 54592kB is below limit 65536kB for oom_score_adj 12 [ 1302.122045] Free memory is -12908kB above reserved [ 1302.125913] lowmemorykiller: Killing 'syz-executor.4' (4529) (tgid 4529), adj 1000, [ 1302.125913] to free 35984kB on behalf of 'syz-executor.1' (8107) because [ 1302.125913] cache 55192kB is below limit 65536kB for oom_score_adj 12 [ 1302.125913] Free memory is -13016kB above reserved [ 1302.128483] lowmemorykiller: Killing 'syz-executor.5' (2963) (tgid 2963), adj 1000, [ 1302.128483] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.128483] cache 54392kB is below limit 65536kB for oom_score_adj 12 [ 1302.128483] Free memory is -13008kB above reserved [ 1302.132340] lowmemorykiller: Killing 'syz-executor.4' (3476) (tgid 3476), adj 1000, [ 1302.132340] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.132340] cache 54092kB is below limit 65536kB for oom_score_adj 12 [ 1302.132340] Free memory is -12812kB above reserved [ 1302.134742] lowmemorykiller: Killing 'syz-executor.4' (3736) (tgid 3736), adj 1000, [ 1302.134742] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.134742] cache 53692kB is below limit 65536kB for oom_score_adj 12 [ 1302.134742] Free memory is -13004kB above reserved [ 1302.137199] lowmemorykiller: Killing 'syz-executor.4' (4256) (tgid 4256), adj 1000, [ 1302.137199] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.137199] cache 53292kB is below limit 65536kB for oom_score_adj 12 [ 1302.137199] Free memory is -13040kB above reserved [ 1302.140779] lowmemorykiller: Killing 'syz-executor.4' (4278) (tgid 4278), adj 1000, [ 1302.140779] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.140779] cache 52992kB is below limit 65536kB for oom_score_adj 12 [ 1302.140779] Free memory is -13040kB above reserved [ 1302.143762] lowmemorykiller: Killing 'syz-executor.4' (4196) (tgid 4196), adj 1000, [ 1302.143762] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.143762] cache 53492kB is below limit 65536kB for oom_score_adj 12 [ 1302.143762] Free memory is -13096kB above reserved [ 1302.150147] lowmemorykiller: Killing 'syz-executor.4' (4559) (tgid 4559), adj 1000, [ 1302.150147] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.150147] cache 52492kB is below limit 65536kB for oom_score_adj 12 [ 1302.150147] Free memory is -12992kB above reserved [ 1302.156628] lowmemorykiller: Killing 'syz-executor.1' (4595) (tgid 4595), adj 1000, [ 1302.156628] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.156628] cache 52192kB is below limit 65536kB for oom_score_adj 12 [ 1302.156628] Free memory is -13080kB above reserved [ 1302.163215] lowmemorykiller: Killing 'syz-executor.1' (4691) (tgid 4691), adj 1000, [ 1302.163215] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.163215] cache 51992kB is below limit 65536kB for oom_score_adj 12 [ 1302.163215] Free memory is -13148kB above reserved [ 1302.169889] lowmemorykiller: Killing 'syz-executor.1' (4848) (tgid 4848), adj 1000, [ 1302.169889] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.169889] cache 51692kB is below limit 65536kB for oom_score_adj 12 [ 1302.169889] Free memory is -12916kB above reserved [ 1302.173396] lowmemorykiller: Killing 'syz-executor.4' (4317) (tgid 4317), adj 1000, [ 1302.173396] to free 35980kB on behalf of 'syz-executor.1' (8100) because [ 1302.173396] cache 52792kB is below limit 65536kB for oom_score_adj 12 [ 1302.173396] Free memory is -13008kB above reserved [ 1302.175792] lowmemorykiller: Killing 'syz-executor.0' (7253) (tgid 7253), adj 1000, [ 1302.175792] to free 35980kB on behalf of 'syz-executor.1' (8107) because [ 1302.175792] cache 51492kB is below limit 65536kB for oom_score_adj 12 [ 1302.175792] Free memory is -13108kB above reserved [ 1302.180187] lowmemorykiller: Killing 'syz-executor.5' (14829) (tgid 14829), adj 1000, [ 1302.180187] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.180187] cache 51292kB is below limit 65536kB for oom_score_adj 12 [ 1302.180187] Free memory is -13200kB above reserved [ 1302.182545] lowmemorykiller: Killing 'syz-executor.0' (1252) (tgid 1252), adj 1000, [ 1302.182545] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.182545] cache 50992kB is below limit 65536kB for oom_score_adj 12 [ 1302.182545] Free memory is -13100kB above reserved [ 1302.183608] lowmemorykiller: Killing 'syz-executor.0' (1410) (tgid 1410), adj 1000, [ 1302.183608] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.183608] cache 50692kB is below limit 65536kB for oom_score_adj 12 [ 1302.183608] Free memory is -12988kB above reserved [ 1302.184805] lowmemorykiller: Killing 'syz-executor.5' (3191) (tgid 3191), adj 1000, [ 1302.184805] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.184805] cache 50492kB is below limit 65536kB for oom_score_adj 12 [ 1302.184805] Free memory is -13036kB above reserved [ 1302.188341] lowmemorykiller: Killing 'syz-executor.5' (3226) (tgid 3226), adj 1000, [ 1302.188341] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.188341] cache 50192kB is below limit 65536kB for oom_score_adj 12 [ 1302.188341] Free memory is -13104kB above reserved [ 1302.191103] lowmemorykiller: Killing 'syz-executor.5' (4068) (tgid 4068), adj 1000, [ 1302.191103] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.191103] cache 49992kB is below limit 65536kB for oom_score_adj 12 [ 1302.191103] Free memory is -12904kB above reserved [ 1302.196371] lowmemorykiller: Killing 'syz-executor.5' (4267) (tgid 4267), adj 1000, [ 1302.196371] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.196371] cache 49592kB is below limit 65536kB for oom_score_adj 12 [ 1302.196371] Free memory is -13100kB above reserved [ 1302.202166] lowmemorykiller: Killing 'syz-executor.5' (4300) (tgid 4300), adj 1000, [ 1302.202166] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.202166] cache 49292kB is below limit 65536kB for oom_score_adj 12 [ 1302.202166] Free memory is -13164kB above reserved [ 1302.205634] lowmemorykiller: Killing 'syz-executor.4' (4301) (tgid 4301), adj 1000, [ 1302.205634] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.205634] cache 48992kB is below limit 65536kB for oom_score_adj 12 [ 1302.205634] Free memory is -13056kB above reserved [ 1302.211425] lowmemorykiller: Killing 'syz-executor.0' (5886) (tgid 5886), adj 1000, [ 1302.211425] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.211425] cache 48592kB is below limit 65536kB for oom_score_adj 12 [ 1302.211425] Free memory is -13040kB above reserved [ 1302.218494] lowmemorykiller: Killing 'syz-executor.0' (6706) (tgid 6706), adj 1000, [ 1302.218494] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.218494] cache 48192kB is below limit 65536kB for oom_score_adj 12 [ 1302.218494] Free memory is -13052kB above reserved [ 1302.224833] lowmemorykiller: Killing 'syz-executor.0' (6833) (tgid 6833), adj 1000, [ 1302.224833] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.224833] cache 47992kB is below limit 65536kB for oom_score_adj 12 [ 1302.224833] Free memory is -13120kB above reserved [ 1302.228120] lowmemorykiller: Killing 'syz-executor.0' (6887) (tgid 6887), adj 1000, [ 1302.228120] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.228120] cache 47672kB is below limit 65536kB for oom_score_adj 12 [ 1302.228120] Free memory is -13212kB above reserved [ 1302.236962] lowmemorykiller: Killing 'syz-executor.0' (7131) (tgid 7131), adj 1000, [ 1302.236962] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.236962] cache 46872kB is below limit 65536kB for oom_score_adj 12 [ 1302.236962] Free memory is -13012kB above reserved [ 1302.241568] lowmemorykiller: Killing 'syz-executor.1' (4535) (tgid 4535), adj 1000, [ 1302.241568] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.241568] cache 48792kB is below limit 65536kB for oom_score_adj 12 [ 1302.241568] Free memory is -13048kB above reserved [ 1302.247332] lowmemorykiller: Killing 'syz-executor.0' (7166) (tgid 7166), adj 1000, [ 1302.247332] to free 35976kB on behalf of 'syz-executor.1' (8107) because [ 1302.247332] cache 46072kB is below limit 65536kB for oom_score_adj 12 [ 1302.247332] Free memory is -13396kB above reserved [ 1302.251299] lowmemorykiller: Killing 'syz-executor.0' (7282) (tgid 7282), adj 1000, [ 1302.251299] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.251299] cache 45572kB is below limit 65536kB for oom_score_adj 12 [ 1302.251299] Free memory is -13216kB above reserved [ 1302.253168] lowmemorykiller: Killing 'syz-executor.1' (8100) (tgid 8093), adj 1000, [ 1302.253168] to free 35976kB on behalf of 'syz-executor.1' (8100) because [ 1302.253168] cache 44772kB is below limit 65536kB for oom_score_adj 12 [ 1302.253168] Free memory is -12964kB above reserved [ 1303.254547] lowmemorykiller: Killing 'syz-executor.1' (8100) (tgid 8093), adj 1000, [ 1303.254547] to free 35484kB on behalf of 'syz-executor.1' (8100) because [ 1303.254547] cache 1064kB is below limit 6144kB for oom_score_adj 0 [ 1303.254547] Free memory is -13280kB above reserved [ 1304.264570] lowmemorykiller: Killing 'syz-executor.1' (8100) (tgid 8093), adj 1000, [ 1304.264570] to free 35000kB on behalf of 'syz-fuzzer' (2043) because [ 1304.264570] cache 284kB is below limit 6144kB for oom_score_adj 0 [ 1304.264570] Free memory is -13292kB above reserved [ 1304.264581] lowmemorykiller: Killing 'syz-executor.1' (8100) (tgid 8093), adj 1000, [ 1304.264581] to free 35000kB on behalf of 'syz-executor.1' (8100) because [ 1304.264581] cache 284kB is below limit 6144kB for oom_score_adj 0 [ 1304.264581] Free memory is -13292kB above reserved [ 1305.267791] oom_reaper: reaped process 8100 (syz-executor.1), now anon-rss:0kB, file-rss:16kB, shmem-rss:0kB [ 1305.317017] syz-executor.1: vmalloc: allocation failure, allocated 2832224256 of 3463856128 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1305.364830] CPU: 1 PID: 8100 Comm: syz-executor.1 Not tainted 4.9.194+ #0 [ 1305.371755] ffff88018184f998 ffffffff81b67001 1ffff10030309f35 dffffc0000000000 [ 1305.379831] ffffffff82aab480 0000000000000000 0000000000400000 ffff88018184fac0 [ 1305.387885] ffffffff815080fc 0000000041b58ab3 ffffffff82e3bc80 ffffffff81431d00 [ 1305.395989] Call Trace: [ 1305.398581] [<0000000068e25175>] dump_stack+0xc1/0x120 [ 1305.403947] [<0000000054d7f24e>] warn_alloc.cold+0x76/0x93 [ 1305.409661] [<00000000b09bb2da>] ? zone_watermark_ok_safe+0x260/0x260 [ 1305.416327] [<000000007679748a>] ? debug_lockdep_rcu_enabled.part.0+0x60/0x60 [ 1305.423685] [<000000002c26ee6d>] __vmalloc_node_range+0x404/0x610 [ 1305.430012] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1305.436329] [<000000004a398970>] vmalloc+0x5c/0x70 [ 1305.441342] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1305.447661] [<0000000018f2fe98>] xt_alloc_table_info+0xc8/0x100 [ 1305.453815] [<00000000eda34e06>] do_ipt_set_ctl+0x231/0x470 [ 1305.459615] [<000000004394fc46>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 1305.466190] [<0000000064ff5b0f>] ? do_ipt_set_ctl+0x2d/0x470 [ 1305.472072] [<0000000057dac1ac>] nf_setsockopt+0x6d/0xc0 [ 1305.477609] [<0000000007a6f3bf>] ip_setsockopt+0x8a/0xa0 [ 1305.483144] [<000000003a76fa2b>] udp_setsockopt+0x4e/0x90 [ 1305.488768] [<00000000c549f23b>] ipv6_setsockopt+0xa4/0x140 [ 1305.494564] [<00000000640864dd>] tcp_setsockopt+0x8a/0xe0 [ 1305.500187] [<00000000eab59af6>] sock_common_setsockopt+0x9a/0xe0 [ 1305.506522] [<00000000762b3f2f>] SyS_setsockopt+0x159/0x240 [ 1305.512315] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1305.517607] [<000000005aecc47a>] ? SyS_clock_gettime+0x118/0x1f0 [ 1305.523838] [<0000000034ded630>] ? do_syscall_64+0x4a/0x5c0 [ 1305.529644] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1305.534917] [<00000000e294b301>] do_syscall_64+0x1ad/0x5c0 [ 1305.540638] [<00000000239f1e32>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1305.619873] syz-executor.1 invoked oom-killer: gfp_mask=0x24002c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN), nodemask=0, order=0, oom_score_adj=1000 [ 1305.643274] CPU: 1 PID: 8107 Comm: syz-executor.1 Not tainted 4.9.194+ #0 [ 1305.650220] ffff8801958cf6c0 ffffffff81b67001 ffff8801958cfa18 ffffffff833f1c30 [ 1305.658354] 00000000000003e8 ffff8801958cfa30 0000000000000000 ffff8801958cf740 [ 1305.666424] ffffffff81506e44 0000000000000000 00000000000003e8 ffffffff8282ac45 [ 1305.674474] Call Trace: [ 1305.677060] [<0000000068e25175>] dump_stack+0xc1/0x120 [ 1305.682431] [<00000000434b56ce>] dump_header.isra.0+0x142/0x74c [ 1305.688575] [<000000000cdd7a75>] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 1305.695616] [<000000001fe721db>] ? ___ratelimit+0x55/0x413 [ 1305.701331] [<00000000e424f93b>] oom_kill_process.cold+0xd/0xa74 [ 1305.707579] [<000000002d76bdec>] ? oom_badness.part.0+0x11d/0x600 [ 1305.713901] [<0000000026147ef4>] ? oom_badness.part.0+0x12f/0x600 [ 1305.720360] [<0000000037da4e05>] ? out_of_memory+0x6d3/0xea0 [ 1305.726265] [<00000000f6b792a8>] out_of_memory+0x29b/0xea0 [ 1305.731989] [<000000004de7045a>] ? out_of_memory+0x41c/0xea0 [ 1305.734355] Mem-Info: [ 1305.734375] active_anon:110447 inactive_anon:313 isolated_anon:0 [ 1305.734375] active_file:17 inactive_file:25 isolated_file:0 [ 1305.734375] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1305.734375] slab_reclaimable:8596 slab_unreclaimable:65232 [ 1305.734375] mapped:52232 shmem:319 pagetables:16418 bounce:0 [ 1305.734375] free:548 free_pcp:14 free_cma:0 [ 1305.734389] Node 0 active_anon:441788kB inactive_anon:1252kB active_file:68kB inactive_file:100kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208928kB dirty:0kB writeback:0kB shmem:1276kB writeback_tmp:0kB unstable:0kB pages_scanned:5 all_unreclaimable? no [ 1305.734408] DMA32 free:108kB min:4696kB low:7712kB high:10728kB active_anon:72kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:504kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1305.734434] Normal free:2084kB min:5580kB low:9168kB high:12756kB active_anon:441716kB inactive_anon:1252kB active_file:68kB inactive_file:100kB unevictable:0kB writepending:0kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:34384kB slab_unreclaimable:260424kB kernel_stack:24288kB pagetables:65672kB bounce:0kB free_pcp:56kB local_pcp:56kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1305.734473] DMA32: 6*4kB (UM) 5*8kB (UM) 1*16kB (M) 2*32kB (M) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 144kB Normal: 64*4kB (UM) 4*8kB (UM) 1*16kB (H) 50*32kB (U) 2*64kB (U) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 2160kB 372 total pagecache pages [ 1305.734513] 0 pages in swap cache [ 1305.734517] Swap cache stats: add 0, delete 0, find 0/0 [ 1305.734519] Free swap = 0kB [ 1305.734521] Total swap = 0kB [ 1305.734523] 1965979 pages RAM [ 1305.734525] 0 pages HighMem/MovableOnly [ 1305.734527] 313627 pages reserved [ 1305.916354] [<00000000ed90d644>] ? oom_killer_disable+0x210/0x210 [ 1305.922678] [<00000000048e4607>] ? trace_hardirqs_on+0xd/0x10 [ 1305.928653] [<00000000b9aa85a7>] ? __alloc_pages_nodemask+0x10d0/0x1a80 [ 1305.935494] [<00000000b51e09a1>] __alloc_pages_nodemask+0x1730/0x1a80 [ 1305.942164] [<0000000098031320>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 1305.948839] [<00000000340c07de>] ? check_preemption_disabled+0x3c/0x200 [ 1305.955678] [<00000000de850046>] __vmalloc_node_range+0x25b/0x610 [ 1305.962004] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1305.968329] [<000000004a398970>] vmalloc+0x5c/0x70 [ 1305.973613] [<0000000018f2fe98>] ? xt_alloc_table_info+0xc8/0x100 [ 1305.979938] [<0000000018f2fe98>] xt_alloc_table_info+0xc8/0x100 [ 1305.986098] [<00000000eda34e06>] do_ipt_set_ctl+0x231/0x470 [ 1305.991893] [<000000004394fc46>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 1305.998476] [<00000000e2a93f40>] ? mutex_unlock+0x9/0x10 [ 1306.004015] [<000000001918843e>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 1306.011121] [<0000000057dac1ac>] nf_setsockopt+0x6d/0xc0 [ 1306.016656] [<0000000007a6f3bf>] ip_setsockopt+0x8a/0xa0 [ 1306.022194] [<000000003a76fa2b>] udp_setsockopt+0x4e/0x90 [ 1306.027823] [<00000000c549f23b>] ipv6_setsockopt+0xa4/0x140 [ 1306.033659] [<00000000640864dd>] tcp_setsockopt+0x8a/0xe0 [ 1306.039294] [<00000000eab59af6>] sock_common_setsockopt+0x9a/0xe0 [ 1306.045623] [<00000000762b3f2f>] SyS_setsockopt+0x159/0x240 [ 1306.051416] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1306.056695] [<000000005aecc47a>] ? SyS_clock_gettime+0x118/0x1f0 [ 1306.062930] [<0000000034ded630>] ? do_syscall_64+0x4a/0x5c0 [ 1306.068736] [<00000000bafbb828>] ? SyS_recv+0x40/0x40 [ 1306.074009] [<00000000e294b301>] do_syscall_64+0x1ad/0x5c0 [ 1306.079721] [<00000000239f1e32>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1306.086878] lowmemorykiller: Killing 'syz-executor.5' (19695) (tgid 19695), adj 1000, [ 1306.086878] to free 34976kB on behalf of 'rsyslogd' (1899) because [ 1306.086878] cache 212kB is below limit 6144kB for oom_score_adj 0 [ 1306.086878] Free memory is -35312kB above reserved [ 1306.091195] lowmemorykiller: Killing 'syz-executor.5' (19695) (tgid 19695), adj 1000, [ 1306.091195] to free 34976kB on behalf of 'kswapd0' (33) because [ 1306.091195] cache 212kB is below limit 6144kB for oom_score_adj 0 [ 1306.091195] Free memory is -35312kB above reserved [ 1306.267065] Mem-Info: [ 1306.269526] active_anon:110446 inactive_anon:313 isolated_anon:0 [ 1306.269526] active_file:20 inactive_file:40 isolated_file:0 [ 1306.269526] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1306.269526] slab_reclaimable:8596 slab_unreclaimable:65054 [ 1306.269526] mapped:52232 shmem:319 pagetables:16381 bounce:0 [ 1306.269526] free:26526 free_pcp:212 free_cma:0 [ 1306.302614] Node 0 active_anon:441784kB inactive_anon:1252kB active_file:80kB inactive_file:160kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208928kB dirty:0kB writeback:0kB shmem:1276kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1306.327435] DMA32 free:100kB min:4696kB low:7712kB high:10728kB active_anon:72kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:504kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1306.384340] lowmem_reserve[]: 0 3505 3505 [ 1306.389070] Normal free:363268kB min:5580kB low:9168kB high:12756kB active_anon:441656kB inactive_anon:1252kB active_file:84kB inactive_file:288kB unevictable:0kB writepending:0kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:34384kB slab_unreclaimable:259680kB kernel_stack:24256kB pagetables:65568kB bounce:0kB free_pcp:776kB local_pcp:672kB free_cma:0kB [ 1306.426016] lowmem_reserve[]: 0 0 0 [ 1306.430260] DMA32: 6*4kB (UM) 5*8kB (UM) 1*16kB (M) 2*32kB (M) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 144kB [ 1306.444943] Normal: 3459*4kB (UM) 3107*8kB (UM) 2976*16kB (UH) 3036*32kB (UM) 3087*64kB (UM) 454*128kB (UMH) 80*256kB (UM) 2*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 460644kB 548 total pagecache pages [ 1306.466239] 0 pages in swap cache [ 1306.469921] Swap cache stats: add 0, delete 0, find 0/0 [ 1306.475345] Free swap = 0kB [ 1306.478353] Total swap = 0kB [ 1306.481358] 1965979 pages RAM [ 1306.484466] 0 pages HighMem/MovableOnly [ 1306.488813] 313627 pages reserved [ 1306.492614] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 1306.501706] [ 470] 0 470 5365 170 17 3 0 -1000 udevd [ 1306.510580] [ 1757] 0 1757 2492 574 9 3 0 0 dhclient [ 1306.519701] [ 1895] 0 1895 14231 209 24 3 0 0 rsyslogd [ 1306.528911] [ 1946] 0 1946 4724 50 15 3 0 0 cron [ 1306.539347] [ 1964] 0 1964 3735 45 11 3 0 0 mcstransd [ 1306.550138] [ 1966] 0 1966 12926 1231 28 3 0 0 restorecond [ 1306.559637] [ 1996] 0 1996 12489 153 29 3 0 -1000 sshd [ 1306.568471] [ 2026] 0 2026 3648 40 13 3 0 0 getty [ 1306.577355] [ 2036] 0 2036 17820 197 40 3 0 0 sshd [ 1306.586388] [ 2038] 0 2038 135575 89810 226 5 0 0 syz-fuzzer [ 1306.595703] [13468] 0 13468 18114 15 23 3 0 0 syz-executor.5 [ 1306.605583] [13469] 0 13469 18113 8730 24 4 0 0 syz-executor.5 [ 1306.615581] [14357] 0 14357 18146 8709 25 3 0 1000 syz-executor.5 [ 1306.628003] [14839] 0 14839 18146 8709 25 3 0 1000 syz-executor.5 [ 1306.637593] [15191] 0 15191 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.647383] [15548] 0 15548 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.656949] [15554] 0 15554 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.666750] [15559] 0 15559 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.676318] [15568] 0 15568 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.686108] [15579] 0 15579 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.695666] [15593] 0 15593 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.705435] [15987] 0 15987 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.715001] [16318] 0 16318 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.724802] [16340] 0 16340 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.734361] [16349] 0 16349 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.743898] [16363] 0 16363 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.753699] [16752] 0 16752 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.763290] [17083] 0 17083 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.773122] [17603] 0 17603 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.782700] [18129] 0 18129 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.792527] [18144] 0 18144 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.802118] [18158] 0 18158 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.812010] [18657] 0 18657 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.821589] [18676] 0 18676 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.831375] [19702] 0 19702 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.840958] [19710] 0 19710 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.850768] [19725] 0 19725 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.860346] [19745] 0 19745 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.870137] [20073] 0 20073 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.879710] [20461] 0 20461 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.889502] [20497] 0 20497 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.899088] [20987] 0 20987 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.908937] [21011] 0 21011 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.918522] [21501] 0 21501 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.928317] [21509] 0 21509 18146 8742 26 4 0 1000 syz-executor.5 [ 1306.937892] [21523] 0 21523 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.947680] [21529] 0 21529 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.957337] [21537] 0 21537 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.967119] [22024] 0 22024 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.976691] [22038] 0 22038 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.986571] [22529] 0 22529 18146 8710 25 3 0 1000 syz-executor.5 [ 1306.996197] [22562] 0 22562 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.006013] [23248] 0 23248 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.015596] [23572] 0 23572 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.025376] [23943] 0 23943 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.034925] [23960] 0 23960 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.044464] [23975] 0 23975 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.053994] [23987] 0 23987 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.063544] [24334] 0 24334 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.073130] [24353] 0 24353 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.082725] [24684] 0 24684 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.092272] [24699] 0 24699 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.101811] [24718] 0 24718 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.111343] [24725] 0 24725 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.120884] [25405] 0 25405 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.130414] [25418] 0 25418 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.139949] [25437] 0 25437 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.149586] [25768] 0 25768 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.159151] [25786] 0 25786 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.168686] [25801] 0 25801 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.178238] [25814] 0 25814 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.187776] [26138] 0 26138 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.197314] [26148] 0 26148 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.206847] [26166] 0 26166 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.216378] [26176] 0 26176 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.225912] [26540] 0 26540 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.235656] [26859] 0 26859 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.245205] [26884] 0 26884 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.255001] [27226] 0 27226 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.264603] [27238] 0 27238 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.274138] [27249] 0 27249 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.283688] [27572] 0 27572 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.293227] [27583] 0 27583 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.302777] [27591] 0 27591 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.312334] [27600] 0 27600 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.321878] [27608] 0 27608 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.331412] [27613] 0 27613 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.340965] [27939] 0 27939 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.350519] [27946] 0 27946 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.360073] [27950] 0 27950 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.369638] [27951] 0 27951 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.379175] [27955] 0 27955 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.388708] [27957] 0 27957 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.398249] [27968] 0 27968 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.407802] [27975] 0 27975 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.417339] [28317] 0 28317 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.426887] [28343] 0 28343 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.436425] [28707] 0 28707 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.445962] [28883] 0 28883 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.455516] [29115] 0 29115 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.465056] [29128] 0 29128 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.474594] [29558] 0 29558 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.484113] [29665] 0 29665 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.493657] [29678] 0 29678 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.503210] [30018] 0 30018 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.512750] [30418] 0 30418 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.522289] [30428] 0 30428 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.531825] [30447] 0 30447 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.541365] [30835] 0 30835 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.550913] [30851] 0 30851 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.560476] [31043] 0 31043 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.570020] [31416] 0 31416 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.579560] [31459] 0 31459 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.589102] [31498] 0 31498 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.598636] [31508] 0 31508 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.608191] [31686] 0 31686 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.617742] [31696] 0 31696 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.627282] [31714] 0 31714 18146 8742 26 4 0 1000 syz-executor.5 [ 1307.636826] [31745] 0 31745 18114 15 23 3 0 0 syz-executor.4 [ 1307.646400] [31746] 0 31746 18113 8731 24 4 0 0 syz-executor.4 [ 1307.655946] [31915] 0 31915 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.665518] [31932] 0 31932 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.675081] [31965] 0 31965 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.684626] [32299] 0 32299 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.694190] [32328] 0 32328 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.703736] [32358] 0 32358 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.713272] [32398] 0 32398 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.722807] [32436] 0 32436 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.732344] [32458] 0 32458 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.741883] [32487] 0 32487 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.751451] [32573] 0 32573 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.761005] [32594] 0 32594 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.770597] [32618] 0 32618 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.780207] [ 367] 0 367 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.789757] [ 391] 0 391 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.799299] [ 575] 0 575 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.808851] [ 610] 0 610 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.818402] [ 654] 0 654 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.827955] [ 729] 0 729 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.837508] [ 751] 0 751 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.847052] [ 767] 0 767 18114 15 23 3 0 0 syz-executor.2 [ 1307.856598] [ 768] 0 768 18113 8731 24 4 0 0 syz-executor.2 [ 1307.866258] [ 773] 0 773 18114 15 23 3 0 0 syz-executor.0 [ 1307.875815] [ 774] 0 774 18113 8730 24 4 0 0 syz-executor.0 [ 1307.885379] [ 1075] 0 1075 18147 8739 26 4 0 1000 syz-executor.2 [ 1307.894940] [ 1077] 0 1077 18147 8707 25 3 0 1000 syz-executor.0 [ 1307.904489] [ 1078] 0 1078 18147 8707 25 3 0 1000 syz-executor.2 [ 1307.914016] [ 1104] 0 1104 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.923590] [ 1124] 0 1124 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.933196] [ 1145] 0 1145 18146 8742 26 4 0 1000 syz-executor.0 [ 1307.942749] [ 1156] 0 1156 18146 8710 25 3 0 1000 syz-executor.0 [ 1307.952295] [ 1191] 0 1191 18146 8709 25 3 0 1000 syz-executor.2 [ 1307.961843] [ 1219] 0 1219 18146 8710 25 3 0 1000 syz-executor.5 [ 1307.971392] [ 1227] 0 1227 18146 8742 26 4 0 1000 syz-executor.0 [ 1307.980932] [ 1228] 0 1228 18146 8711 25 3 0 1000 syz-executor.2 [ 1307.990470] [ 1244] 0 1244 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.000013] [ 1245] 0 1245 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.009552] [ 1256] 0 1256 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.019091] [ 1261] 0 1261 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.028625] [ 1275] 0 1275 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.038166] [ 1299] 0 1299 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.047717] [ 1301] 0 1301 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.057278] [ 1318] 0 1318 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.066830] [ 1327] 0 1327 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.077063] [ 1361] 0 1361 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.086610] [ 1385] 0 1385 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.096148] [ 1419] 0 1419 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.105685] [ 1450] 0 1450 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.115228] [ 1473] 0 1473 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.124768] [ 1482] 0 1482 18146 8742 26 4 0 1000 syz-executor.0 [ 1308.134329] [ 1486] 0 1486 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.143851] [ 1501] 0 1501 18146 8742 26 4 0 1000 syz-executor.0 [ 1308.153397] [ 1515] 0 1515 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.162939] [ 1524] 0 1524 18146 8742 26 4 0 1000 syz-executor.0 [ 1308.172480] [ 1526] 0 1526 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.182026] [ 1542] 0 1542 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.191574] [ 1544] 0 1544 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.201112] [ 1563] 0 1563 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.210654] [ 1647] 0 1647 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.220220] [ 1679] 0 1679 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.229803] [ 1702] 0 1702 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.239365] [ 1719] 0 1719 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.248927] [ 1746] 0 1746 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.258594] [ 1777] 0 1777 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.268157] [ 1822] 0 1822 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.277700] [ 1832] 0 1832 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.287242] [ 1862] 0 1862 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.296791] [ 1864] 0 1864 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.306452] [ 1871] 0 1871 5364 171 16 3 0 -1000 udevd [ 1308.315240] [ 1891] 0 1891 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.324875] [ 1917] 0 1917 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.334536] [ 1924] 0 1924 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.344071] [ 1971] 0 1971 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.353626] [ 2012] 0 2012 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.363286] [ 2076] 0 2076 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.372883] [ 2097] 0 2097 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.382482] [ 2116] 0 2116 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.392078] [ 2143] 0 2143 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.401958] [ 2158] 0 2158 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.411563] [ 2167] 0 2167 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.421172] [ 2195] 0 2195 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.430869] [ 2247] 0 2247 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.440486] [ 2250] 0 2250 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.450168] [ 2275] 0 2275 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459751] [ 2287] 0 2287 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459763] [ 2311] 0 2311 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459773] [ 2310] 0 2310 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459782] [ 2334] 0 2334 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459791] [ 2340] 0 2340 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459800] [ 2346] 0 2346 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459809] [ 2375] 0 2375 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459818] [ 2380] 0 2380 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.459827] [ 2395] 0 2395 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459836] [ 2414] 0 2414 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.459845] [ 2423] 0 2423 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.459854] [ 2458] 0 2458 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459863] [ 2457] 0 2457 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459872] [ 2472] 0 2472 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459881] [ 2478] 0 2478 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459890] [ 2494] 0 2494 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459899] [ 2497] 0 2497 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459908] [ 2526] 0 2526 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459917] [ 2528] 0 2528 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459926] [ 2550] 0 2550 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459935] [ 2551] 0 2551 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459944] [ 2586] 0 2586 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459952] [ 2602] 0 2602 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459961] [ 2641] 0 2641 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.459970] [ 2688] 0 2688 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459979] [ 2708] 0 2708 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.459992] [ 2733] 0 2733 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460001] [ 2735] 0 2735 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460010] [ 2763] 0 2763 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460019] [ 2766] 0 2766 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460028] [ 2789] 0 2789 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460036] [ 2828] 0 2828 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460045] [ 2861] 0 2861 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460054] [ 2893] 0 2893 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460063] [ 2898] 0 2898 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460072] [ 2924] 0 2924 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460081] [ 2928] 0 2928 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460090] [ 2957] 0 2957 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460100] [ 3021] 0 3021 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460108] [ 3024] 0 3024 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460116] [ 3093] 0 3093 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460124] [ 3120] 0 3120 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460133] [ 3138] 0 3138 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460142] [ 3171] 0 3171 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460152] [ 3174] 0 3174 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460164] [ 3212] 0 3212 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460176] [ 3229] 0 3229 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460185] [ 3241] 0 3241 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460196] [ 3283] 0 3283 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.460206] [ 3303] 0 3303 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460214] [ 3307] 0 3307 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460224] [ 3484] 0 3484 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460233] [ 3486] 0 3486 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460245] [ 3498] 0 3498 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460253] [ 3517] 0 3517 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460263] [ 3523] 0 3523 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460271] [ 3532] 0 3532 18114 16 23 3 0 0 syz-executor.3 [ 1308.460280] [ 3533] 0 3533 18113 8731 24 4 0 0 syz-executor.3 [ 1308.460289] [ 3716] 0 3716 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460298] [ 3741] 0 3741 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460307] [ 3751] 0 3751 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460316] [ 3771] 0 3771 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460325] [ 3794] 0 3794 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460334] [ 3844] 0 3844 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460342] [ 3875] 0 3875 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460351] [ 3901] 0 3901 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460360] [ 3974] 0 3974 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460369] [ 4002] 0 4002 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460378] [ 4029] 0 4029 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460387] [ 4056] 0 4056 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460396] [ 4078] 0 4078 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.460404] [ 4092] 0 4092 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460413] [ 4107] 0 4107 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460422] [ 4131] 0 4131 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460431] [ 4141] 0 4141 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460440] [ 4163] 0 4163 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460449] [ 4166] 0 4166 18146 8712 25 3 0 1000 syz-executor.2 [ 1308.460458] [ 4183] 0 4183 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.460467] [ 4189] 0 4189 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460477] [ 4198] 0 4198 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460486] [ 4211] 0 4211 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460501] [ 4216] 0 4216 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460510] [ 4224] 0 4224 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460519] [ 4242] 0 4242 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460531] [ 4273] 0 4273 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460540] [ 4279] 0 4279 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460552] [ 4284] 0 4284 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460564] [ 4308] 0 4308 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460574] [ 4312] 0 4312 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460585] [ 4328] 0 4328 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460596] [ 4347] 0 4347 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460606] [ 4354] 0 4354 18114 15 23 3 0 0 syz-executor.1 [ 1308.460616] [ 4355] 0 4355 18113 8731 24 4 0 0 syz-executor.1 [ 1308.460625] [ 4366] 0 4366 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460634] [ 4369] 0 4369 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460643] [ 4519] 0 4519 18147 8707 25 3 0 1000 syz-executor.1 [ 1308.460652] [ 4540] 0 4540 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460661] [ 4539] 0 4539 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460670] [ 4544] 0 4544 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460679] [ 4551] 0 4551 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460688] [ 4566] 0 4566 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460697] [ 4577] 0 4577 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460706] [ 4579] 0 4579 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460714] [ 4597] 0 4597 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460723] [ 4603] 0 4603 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460732] [ 4604] 0 4604 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460741] [ 4619] 0 4619 18146 8711 25 3 0 1000 syz-executor.4 [ 1308.460750] [ 4627] 0 4627 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460759] [ 4638] 0 4638 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460768] [ 4658] 0 4658 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460777] [ 4659] 0 4659 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460785] [ 4666] 0 4666 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460794] [ 4665] 0 4665 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460803] [ 4678] 0 4678 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460812] [ 4687] 0 4687 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460820] [ 4694] 0 4694 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460829] [ 4695] 0 4695 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460838] [ 4708] 0 4708 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460847] [ 4709] 0 4709 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460856] [ 4719] 0 4719 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460865] [ 4721] 0 4721 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460874] [ 4729] 0 4729 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460883] [ 4735] 0 4735 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.460892] [ 4744] 0 4744 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460900] [ 4753] 0 4753 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460909] [ 4758] 0 4758 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460918] [ 4770] 0 4770 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.460927] [ 4774] 0 4774 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460936] [ 4771] 0 4771 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.460945] [ 4787] 0 4787 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460954] [ 4791] 0 4791 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.460965] [ 4792] 0 4792 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460975] [ 4800] 0 4800 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.460985] [ 4827] 0 4827 18146 8743 26 4 0 1000 syz-executor.1 [ 1308.461002] [ 4829] 0 4829 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.461013] [ 4834] 0 4834 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.461023] [ 4837] 0 4837 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461031] [ 4854] 0 4854 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.461040] [ 4865] 0 4865 18146 8711 25 3 0 1000 syz-executor.1 [ 1308.461049] [ 4891] 0 4891 18146 8712 26 3 0 1000 syz-executor.1 [ 1308.461058] [ 4893] 0 4893 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461067] [ 4897] 0 4897 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461076] [ 4915] 0 4915 18146 8712 26 3 0 1000 syz-executor.1 [ 1308.461085] [ 4919] 0 4919 18245 8718 26 3 0 1000 syz-executor.1 [ 1308.461094] [ 4926] 0 4926 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461103] [ 4937] 0 4937 18146 8713 25 3 0 1000 syz-executor.1 [ 1308.461112] [ 4942] 0 4942 18212 8717 25 3 0 1000 syz-executor.1 [ 1308.461121] [ 4941] 0 4941 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461129] [ 4953] 0 4953 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461138] [ 4981] 0 4981 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461147] [ 5019] 0 5019 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461156] [ 5027] 0 5027 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461165] [ 5032] 0 5032 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461173] [ 5051] 0 5051 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461182] [ 5074] 0 5074 18146 8713 26 3 0 1000 syz-executor.1 [ 1308.461191] [ 5079] 0 5079 18212 8717 26 3 0 1000 syz-executor.1 [ 1308.461200] [ 5083] 0 5083 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461209] [ 5126] 0 5126 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461218] [ 5130] 0 5130 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461227] [ 5167] 0 5167 18146 8712 25 3 0 1000 syz-executor.1 [ 1308.461235] [ 5172] 0 5172 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461244] [ 5174] 0 5174 18212 8716 25 3 0 1000 syz-executor.1 [ 1308.461253] [ 5189] 0 5189 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461262] [ 5193] 0 5193 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461271] [ 5200] 0 5200 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461280] [ 5214] 0 5214 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461289] [ 5216] 0 5216 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461297] [ 5235] 0 5235 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461306] [ 5245] 0 5245 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461315] [ 5256] 0 5256 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461324] [ 5282] 0 5282 18245 8718 25 3 0 1000 syz-executor.1 [ 1308.461333] [ 5285] 0 5285 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461342] [ 5336] 0 5336 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461350] [ 5343] 0 5343 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461359] [ 5350] 0 5350 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461371] [ 5356] 0 5356 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461388] [ 5359] 0 5359 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461399] [ 5380] 0 5380 18179 8715 25 3 0 1000 syz-executor.1 [ 1308.461410] [ 5405] 0 5405 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461426] [ 5436] 0 5436 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461436] [ 5439] 0 5439 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461446] [ 5446] 0 5446 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461456] [ 5451] 0 5451 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461465] [ 5463] 0 5463 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461474] [ 5466] 0 5466 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461483] [ 5469] 0 5469 18146 8712 26 3 0 1000 syz-executor.1 [ 1308.461492] [ 5474] 0 5474 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461501] [ 5494] 0 5494 18212 8717 26 3 0 1000 syz-executor.1 [ 1308.461510] [ 5511] 0 5511 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461519] [ 5545] 0 5545 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461528] [ 5565] 0 5565 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461537] [ 5576] 0 5576 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461546] [ 5582] 0 5582 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461555] [ 5602] 0 5602 18146 8711 26 3 0 1000 syz-executor.1 [ 1308.461563] [ 5610] 0 5610 18179 8713 26 3 0 1000 syz-executor.1 [ 1308.461572] [ 5614] 0 5614 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461582] [ 5627] 0 5627 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461591] [ 5631] 0 5631 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461599] [ 5642] 0 5642 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461608] [ 5646] 0 5646 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461617] [ 5653] 0 5653 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461633] [ 5656] 0 5656 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461642] [ 5657] 0 5657 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461651] [ 5676] 0 5676 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461660] [ 5692] 0 5692 18146 8712 26 3 0 1000 syz-executor.1 [ 1308.461675] [ 5697] 0 5697 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461685] [ 5699] 0 5699 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461699] [ 5713] 0 5713 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461709] [ 5712] 0 5712 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461718] [ 5734] 0 5734 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461726] [ 5736] 0 5736 18245 8718 27 3 0 1000 syz-executor.1 [ 1308.461735] [ 5754] 0 5754 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.461744] [ 5759] 0 5759 18278 8720 32 3 0 1000 syz-executor.1 [ 1308.461756] [ 5761] 0 5761 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461772] [ 5778] 0 5778 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461781] [ 5781] 0 5781 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461789] [ 5784] 0 5784 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461798] [ 5794] 0 5794 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.461807] [ 5796] 0 5796 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461818] [ 5802] 0 5802 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461828] [ 5805] 0 5805 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461838] [ 5825] 0 5825 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461848] [ 5827] 0 5827 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.461858] [ 5835] 0 5835 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461868] [ 5839] 0 5839 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.461878] [ 5869] 0 5869 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.461886] [ 5872] 0 5872 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461902] [ 5896] 0 5896 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.461911] [ 5899] 0 5899 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461920] [ 5900] 0 5900 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.461929] [ 5928] 0 5928 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.461937] [ 5937] 0 5937 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.461953] [ 5945] 0 5945 18146 8742 26 4 0 1000 syz-executor.0 [ 1308.461962] [ 5947] 0 5947 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.461971] [ 5953] 0 5953 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.461980] [ 5963] 0 5963 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.461992] [ 5964] 0 5964 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462001] [ 5976] 0 5976 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462010] [ 5990] 0 5990 18146 8743 26 4 0 1000 syz-executor.2 [ 1308.462019] [ 5995] 0 5995 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462028] [ 6007] 0 6007 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462037] [ 6057] 0 6057 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462045] [ 6069] 0 6069 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462054] [ 6117] 0 6117 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462070] [ 6120] 0 6120 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462079] [ 6124] 0 6124 18146 8713 25 3 0 1000 syz-executor.1 [ 1308.462088] [ 6136] 0 6136 18212 8717 25 3 0 1000 syz-executor.1 [ 1308.462104] [ 6137] 0 6137 18146 8742 26 4 0 1000 syz-executor.5 [ 1308.462113] [ 6139] 0 6139 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462122] [ 6161] 0 6161 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462131] [ 6164] 0 6164 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462140] [ 6177] 0 6177 18146 8712 25 3 0 1000 syz-executor.0 [ 1308.462148] [ 6190] 0 6190 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462157] [ 6193] 0 6193 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462166] [ 6204] 0 6204 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462175] [ 6205] 0 6205 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462184] [ 6208] 0 6208 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462192] [ 6225] 0 6225 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462201] [ 6236] 0 6236 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462210] [ 6260] 0 6260 18212 8716 25 3 0 1000 syz-executor.1 [ 1308.462219] [ 6280] 0 6280 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462228] [ 6288] 0 6288 18146 8742 26 4 0 1000 syz-executor.0 [ 1308.462243] [ 6287] 0 6287 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462252] [ 6293] 0 6293 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462263] [ 6298] 0 6298 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462279] [ 6308] 0 6308 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462289] [ 6316] 0 6316 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462300] [ 6325] 0 6325 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462309] [ 6327] 0 6327 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462320] [ 6371] 0 6371 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462331] [ 6368] 0 6368 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462340] [ 6374] 0 6374 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462349] [ 6391] 0 6391 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462358] [ 6393] 0 6393 18179 8712 25 3 0 1000 syz-executor.0 [ 1308.462367] [ 6398] 0 6398 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462376] [ 6411] 0 6411 18245 8718 26 3 0 1000 syz-executor.1 [ 1308.462385] [ 6421] 0 6421 18146 8701 24 3 0 1000 syz-executor.0 [ 1308.462393] [ 6432] 0 6432 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462402] [ 6434] 0 6434 18179 8712 25 3 0 1000 syz-executor.0 [ 1308.462411] [ 6445] 0 6445 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462420] [ 6446] 0 6446 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462429] [ 6466] 0 6466 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462438] [ 6476] 0 6476 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462447] [ 6475] 0 6475 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462455] [ 6508] 0 6508 18212 8716 25 3 0 1000 syz-executor.1 [ 1308.462464] [ 6525] 0 6525 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462473] [ 6530] 0 6530 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462482] [ 6537] 0 6537 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462492] [ 6545] 0 6545 18245 8718 26 3 0 1000 syz-executor.1 [ 1308.462501] [ 6553] 0 6553 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462510] [ 6555] 0 6555 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462518] [ 6560] 0 6560 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462528] [ 6584] 0 6584 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462536] [ 6586] 0 6586 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462545] [ 6592] 0 6592 18278 8720 32 3 0 1000 syz-executor.1 [ 1308.462554] [ 6605] 0 6605 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462563] [ 6606] 0 6606 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462572] [ 6603] 0 6603 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462581] [ 6619] 0 6619 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462589] [ 6618] 0 6618 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462599] [ 6621] 0 6621 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462607] [ 6642] 0 6642 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462616] [ 6645] 0 6645 18245 8718 26 3 0 1000 syz-executor.1 [ 1308.462625] [ 6682] 0 6682 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462633] [ 6687] 0 6687 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462642] [ 6700] 0 6700 18212 8716 26 3 0 1000 syz-executor.1 [ 1308.462651] [ 6715] 0 6715 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462660] [ 6717] 0 6717 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462669] [ 6724] 0 6724 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462680] [ 6740] 0 6740 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462690] [ 6767] 0 6767 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462701] [ 6784] 0 6784 5364 171 16 3 0 -1000 udevd [ 1308.462711] [ 6796] 0 6796 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462721] [ 6810] 0 6810 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462732] [ 6823] 0 6823 18146 8711 25 3 0 1000 syz-executor.2 07:15:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fcntl$dupfd(r2, 0x406, r3) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xa) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) r4 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_ro(r7, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) write$apparmor_exec(r8, &(0x7f0000000100)={'stack ', '/dev/fuse\x00'}, 0x10) write$uinput_user_dev(r4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 07:15:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r0, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710, 0x0, 0x0, 0x2, [{}, {}]}) sendmsg$nl_route(r0, 0x0, 0x40880) request_key(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4db00000000011b2300000503f10000000000cc000000ac0100000000000400000001007826000056e793e46f989ee68cd5eb080000f30200000000000000f800"/98], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x8}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r3, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1f, &(0x7f00000001c0)=""/84, &(0x7f0000000040)=0x54) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r4, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) pwrite64(r4, &(0x7f0000000440)="b7941eb6a14ca74a68b59461e3e35b9123af7381cdddfe16b38c8a5519ffb578eef4a32cdd078add673102a11b40912314b5b9d8efbfd672f53316eb51ec3a47559c7cbed93430618162063b94243669ccaf60a58b88dcf14a3c77c71f4063d9650a0efa1a857ae2779e6dc45c49bb3ea4cfa224afc089daf18bc7b573326ae02836be3ae8e26d3acbffcaf15ef5766f51ad0de570a6429739f4c0748b44bc3a4ea98ad24b042da6e8ab13bb39cee3f18fa81d51843e1e4e65fa622ff98bc3b99e", 0xc1, 0x4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479]}, 0x45c) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) fsetxattr$security_smack_transmute(r5, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x1) 07:15:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:24 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd445d5d0f476715ba085900323e000006700083d1c7cfd3f37bbfac9645b74eaed22dc04c3652dac40d3b3f"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x2, 0x8}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) dup(0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0xfffffd2c, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x18011) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1308.462741] [ 6826] 0 6826 18146 8712 25 3 0 1000 syz-executor.1 [ 1308.462753] [ 6844] 0 6844 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462762] [ 6850] 0 6850 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462771] [ 6853] 0 6853 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462780] [ 6861] 0 6861 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462789] [ 6870] 0 6870 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462798] [ 6875] 0 6875 18245 8718 26 3 0 1000 syz-executor.1 [ 1308.462807] [ 6882] 0 6882 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462816] [ 6892] 0 6892 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462825] [ 6894] 0 6894 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462833] [ 6899] 0 6899 18146 8710 25 3 0 1000 syz-executor.0 [ 1308.462842] [ 6910] 0 6910 18146 8711 25 3 0 1000 syz-executor.2 07:15:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl(r1, 0xfffffffffffff801, &(0x7f00000001c0)="c59791333ac3b51ac2068d7716552829d687ceb660102cf120a3875e56364eb66d85f6180a992ed801338565f242ff6e61eec2cfe0d3642f514a4bd4b65abc791173919647e55dbfc1bd1c7af747a35ecda3a72ebbae63876f072dcfaf2b83b977014c35d7c1db6d8ba463b2fa971553f6b73774af409c43bac5911168ad5846d7c19d8277ab010ddbd36e996cb2d655a4a93b49949f5898c72f17a1dda1d119e4aeb28097a8713d365164e9964af51faa81baab830b22a82981fb181593fbc3ad7e1f1b3840dc2696bcd8a5047603281217") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) 07:15:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab1004000010040006d32379b87c5ade6e68b6469a2246d81755c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b63010000"], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000400)={0x0, 0x0, 0x6, 0x2, 0x9, 0x7f, 0x7}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0xfffffd2c, 0x10}, 0xc) 07:15:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xa2, 0x4000000000000800, 0x1}, 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'hsr0\x00', 0x2}, 0x18) getpgid(0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000b2162401, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/72) flock(0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast1, @empty}, &(0x7f0000000080)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) ioctl$FIBMAP(r2, 0x1, &(0x7f00000002c0)=0x8) 07:15:24 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f00000000000000011b2300000503f10000000000cc000000ac01000000000006000000010000000000080000f30200000000000000f8000ae7b8bbb76cab100400001004"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa2, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000001240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, &(0x7f0000000040)='&', &(0x7f00000001c0)=""/101}, 0x20) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000002c0)=""/71, 0x47}, {}], 0x3, 0x8888) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x0, 0x0}, 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r3 = dup(0xffffffffffffffff) write$uinput_user_dev(r3, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x10}, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 1308.462851] [ 6982] 0 6982 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462860] [ 6994] 0 6994 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462868] [ 7006] 0 7006 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462877] [ 7008] 0 7008 18146 8712 25 3 0 1000 syz-executor.1 [ 1308.462886] [ 7011] 0 7011 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462895] [ 7018] 0 7018 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462904] [ 7030] 0 7030 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462913] [ 7039] 0 7039 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462922] [ 7043] 0 7043 18146 8711 25 3 0 1000 syz-executor.2 [ 1308.462930] [ 7054] 0 7054 18146 8710 25 3 0 1000 syz-executor.5 [ 1308.462939] [ 7056] 0 7056 18179 8714 25 3 0 1000 syz-executor.1 [ 1308.462948] [ 7062] 0 7062 18146 8710 25 3 0 1000 syz-executor.5